Operations // Careers & People
News & Commentary
Experts Urge InfoSec Info Sharing At Columbia-GCIG Conference
Sara Peters, Senior Editor at Dark ReadingNews
'It all starts at the bar with a beer.'
By Sara Peters Senior Editor at Dark Reading, 5/18/2015
Comment1 Comment  |  Read  |  Post a Comment
When Encrypted Communication Is Not Good Enough
Lysa Myers, Security Researcher, ESETCommentary
For the vast majority of conversations -- on paper, by phone or computer -- encryption is a perfectly adequate form of protection. Unless, of course, a life or livelihood is at stake.
By Lysa Myers Security Researcher, ESET, 5/14/2015
Comment5 comments  |  Read  |  Post a Comment
Taking A Security Program From Zero To Hero
Joshua Goldfarb, VP & CTO - Americas, FireEye.Commentary
Breaking the enigma of InfoSec into smaller bites is a proven method for building up an organization’s security capabilities. Here are six steps to get you started.
By Joshua Goldfarb VP & CTO - Americas, FireEye., 5/13/2015
Comment2 comments  |  Read  |  Post a Comment
Women In Security Speak Out On Why There Are Still So Few Of Them
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
They're now CISOs, security officials in DHS and the NSA, researchers, and key players in security -- but women remain a mere 10% of the industry population.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/11/2015
Comment7 comments  |  Read  |  Post a Comment
Deconstructing Mobile Fraud Risk
Subbu Sthanu, Director, Mobile Security & Application Security, IBMCommentary
Today’s enterprise security solutions don’t do enough to manage BYOD risk, credit card theft and the reputational damage resulting from a major data breach.
By Subbu Sthanu Director, Mobile Security & Application Security, IBM, 5/5/2015
Comment1 Comment  |  Read  |  Post a Comment
Building a Stronger Security Strategy: 6 Tips
Harry Folloder, CIO, Advantage Waypoint LLC (AWP)Commentary
CIO offers his formula for achieving the right balance between data security and employee productivity and convenience
By Harry Folloder CIO, Advantage Waypoint LLC (AWP), 5/4/2015
Comment0 comments  |  Read  |  Post a Comment
Big Data & The Security Skills Shortage
Peter Schlampp, VP of Products, PlatforaCommentary
Finding a security analyst with the data discovery experience to combat modern threats is like searching for the mythical unicorn. The person does not exist
By Peter Schlampp VP of Products, Platfora, 4/29/2015
Comment4 comments  |  Read  |  Post a Comment
Twitter's Top 10 Social CISOs
Marilyn Cohodas, Community Editor, Dark Reading
If you work in information security today, you're on Twitter. Or are you?
By Marilyn Cohodas Community Editor, Dark Reading, 4/27/2015
Comment1 Comment  |  Read  |  Post a Comment
From The RSA Keynote Stage, Day Two
Sara Peters, Senior Editor at Dark ReadingNews
A 9-year-old CEO hacker, a record-breaking swimmer, and a variety of ideas about data-driven security hit the RSA stage.
By Sara Peters Senior Editor at Dark Reading, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
Health Insurers’ Digital Footprint Widening Attack Surface
Peter Zavlaris, Analyst, RiskIQCommentary
Insurers are ripe targets for attackers since they’re efficient concentrators of every kind of data needed for identity theft, credit card and insurance fraud. Here’s proof.
By Peter Zavlaris Analyst, RiskIQ, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
Why Standardized Threat Data Will Help Stop the Next Big Breach
Bill Nelson, President & CEO, Financial Services Information Sharing and Analysis Center (FS-ISAC) and CEO, SoltraCommentary
Adopting industry standards for threat intelligence will reduce a lot of the heavy lifting and free cyber security first responders to focus on what they do best.
By Bill Nelson President & CEO, Financial Services Information Sharing and Analysis Center (FS-ISAC) and CEO, Soltra, 4/15/2015
Comment0 comments  |  Read  |  Post a Comment
Setting Security Professionals Up For Success
Joshua Goldfarb, VP & CTO - Americas, FireEye.Commentary
People, process, and technology are all integral to a successful infosec program. What’s too often missing involves the concept of workflow.
By Joshua Goldfarb VP & CTO - Americas, FireEye., 4/14/2015
Comment2 comments  |  Read  |  Post a Comment
Better Together: Network Operations & Infosec
Steve Riley, Technical Leader, Office of the CTO, Riverbed TechnologyCommentary
Getting networking and information security teams together in the same room is a critical step for companies that want to build a continuous information security culture.
By Steve Riley Technical Leader, Office of the CTO, Riverbed Technology, 4/13/2015
Comment0 comments  |  Read  |  Post a Comment
Insider Threats: Focus On The User, Not The Data
Daniel Velez, Insider Threat Operations, Raytheon Cyber ProductsCommentary
Global cybersecurity spending will hit almost $77 billion in 2015, so why are there more high-profile leaks than ever?
By Daniel Velez Insider Threat Operations, Raytheon Cyber Products, 4/10/2015
Comment2 comments  |  Read  |  Post a Comment
5 Reasons You 'Better Call Saul' To Protect Corporate Data
Corey Nachreiner, Director, Security Strategy & Research, WatchGuard TechnologiesCommentary
These pop-culture lessons from the entertaining Breaking Bad spinoff will make security awareness training both fun and effective.
By Corey Nachreiner Director, Security Strategy & Research, WatchGuard Technologies, 4/8/2015
Comment3 comments  |  Read  |  Post a Comment
So, You 'Don’t Believe In' Security Education?
Joe Ferrara,  President & CEO, Wombat Security TechnologiesCommentary
You're in the minority for a reason. Here's why.
By Joe Ferrara President & CEO, Wombat Security Technologies, 4/7/2015
Comment9 comments  |  Read  |  Post a Comment
Spring Cleaning In The SOC: Focus On the Inside Threat
Jason Straight, Senior VP & Chief Privacy Officer, UnitedLexCommentary
Along with warmer weather and melting snow, spring brings the perfect opportunity for user engagement. Here’s how to transform insiders into your most sophisticated security device.
By Jason Straight Senior VP & Chief Privacy Officer, UnitedLex, 4/1/2015
Comment1 Comment  |  Read  |  Post a Comment
3 Big-Picture Themes CISOs Should Track At Interop
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Security programming is great, but Interop offers opportunity to learn about larger trends that will impact security in the coming year
By Ericka Chickowski Contributing Writer, Dark Reading, 3/31/2015
Comment0 comments  |  Read  |  Post a Comment
Healthcare Is Ignoring Cyber Risk Intel, Academia Even Worse
Jason Polancich, Founder & Chief Architect, SurfWatchLabsCommentary
Healthcare and other sectors are indolently ignoring the process of gathering and using high-level intelligence to focus cyber defenses. Here’s proof.
By Jason Polancich Founder & Chief Architect, SurfWatchLabs, 3/31/2015
Comment5 comments  |  Read  |  Post a Comment
FBI Threat Intelligence Cyber-Analysts Still Marginalized In Agency
Sara Peters, Senior Editor at Dark ReadingNews
Despite good progress, 9/11 Review Commission says that analysts could have a greater impact on FBI counter-terrorism activities if they had more domain awareness, forensics capabilities, and were more empowered to question agents.
By Sara Peters Senior Editor at Dark Reading, 3/25/2015
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

CVE-2015-0915
Published: 2015-05-21
Cross-site scripting (XSS) vulnerability in RAKUS MailDealer 11.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted attachment filename.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.