Careers & People
12/27/2016
08:00 AM
Marilyn Cohodas
Marilyn Cohodas
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Greatest Hits Of 2016: Readers' Picks For The Years' Best Commentary

Here's what topped the Dark Reading page-view charts from the security industry's brightest minds, coolest rock stars, and up-and-coming leaders.

The hacking thriller Mr. Robot may have been snubbed by the 2017 Golden Globe Award nominating committee this month, but security researcher Sarah Vonnegut’s blog -  5 'Mr. Robot' Hacks That Could Happen in Real Life - about the award-winning season one, pulled in the highest numbers of readers of all the contributed content we published in 2016.

Vonnegut, an application security community specialist at Checkmarx, offered a reality check to anti-hero Elliot’s premier season hacking prowess, and garnered a whopping 14,738  page views from Dark Reading fans of the show.  

Other 2016 favorites from our roster of contributors include: 

Rethinking Application Security With Microservices Architectures (6,804 views, 4/15/2016)
Ranga Rajagopalan, Chief Technology Officer, Avi Networks
The advantages offered by the container model go against many of the assumptions of traditional security mechanisms. Here are 5 new concepts & 4 best practices you'll need to understand.

Security Portfolios: A Different Approach To Leadership (6,802 views, 8/11/2016) 
Adam Shostack, Founder, Stealth Startup 
How grounding a conversation around a well-organized list of controls and their goals can help everyone be, literally, on the same page. Part seven of an ongoing series.

How To Stay Safe On The Black Hat Network (6,722 views, 7/28/2016) 
Neil R. Wyler (Grifter), Threat Hunting and Incident Response Specialist, RSA
Black Hat attendees may have changed their titles and now carry business cards but hackers gotta hack and there's no better place to do it than Black Hat.

The Secret Behind the NSA Breach: Network Infrastructure Is The Next Target (6,683 views, 8/25/2016) 
Yoni Allon Research Team Leader, LightCyber
How the networking industry has fallen way behind in incorporating security measures to prevent exploits to ubiquitous routers, proxies, firewalls, and switches.

Anatomy Of An Account Takeover Attack (6,389 views, 2/23/2016)
Ting-Fang Yen, Research Scientist, Datavisor, Inc.
How organized crime rings are amassing bot armies for password-cracking attacks on personal accounts in retail, financial, gaming, and other consumer-facing services.

20 Endpoint Security Questions You Never Thought to Ask  (5,696 views, 10/26/2016)
Joshua Goldfarb. VP & CTO - Emerging Technologies, FireEye
The endpoint detection and response market is exploding! Here's how to make sense of the options, dig deeper, and separate vendor fact from fiction.

5 Soft Skills Young Cybersecurity Professionals Need to Get Ahead (5,615 views 6/14/2016)
Todd Thibodeaux, President & CEO, CompTIA
Today's employers aren't looking for recruits who can maintain firewalls and mitigate risk. They want well-rounded professionals who can apply security expertise across the business to yield bottom-line results.

Why Social Media Sites Are The New Cyber Weapons Of Choice (5,387 views, 9/6/2016)
Nick Hayes, Analyst, Forrester
Facebook, LinkedIn, and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security acumen.

Changing IoT Passwords Won't Stop Attacks. Here's What Will (5,173 views, 11/7/2016)
Paul Madsen, Senior Technical Architect, Ping Identity
The solution will take an industry-wide effort, it won't happen overnight, and the problem is not the users' fault!

Do you have a favorite contributor commentary of 2016? Share it in the comments!

Related Content:

 

 

 

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
waynebishop
50%
50%
waynebishop,
User Rank: Apprentice
2/8/2017 | 3:53:02 AM
Re: wikitrader trading app
good one
AlexJ045
50%
50%
AlexJ045,
User Rank: Apprentice
12/29/2016 | 2:30:02 AM
wikitrader trading app
Your articles and contents are encouraging.
wikitrader trading app
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.