Cloud
News & Commentary
10 Questions To Get Practical Answers At Interop ITX
Dark Reading Staff, Commentary
May 15-19 in Las Vegas: How to get solutions and advice from top speakers for the things that you really want to know.
By Dark Reading Staff , 4/14/2017
Comment0 comments  |  Read  |  Post a Comment
The Long Slog To Getting Encryption Right
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Encryption practices have improved dramatically over the last 10 years, but most organizations still don't have enterprise-wide crypto strategies.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/14/2017
Comment0 comments  |  Read  |  Post a Comment
How Innovative Companies Lock Down Data
Justin Somaini, Chief Security Officer, SAPCommentary
A mix of back-to-basics security and a set of new, data-centric best practices is key to defending against a future of growing and sophisticated cyberattacks.
By Justin Somaini , 4/12/2017
Comment0 comments  |  Read  |  Post a Comment
Forget the Tax Man: Time for a DNS Security Audit
Ericka Chickowski, Contributing Writer, Dark Reading
Here's a 5-step DNS security review process that's not too scary and will help ensure your site availability and improve user experience.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/11/2017
Comment0 comments  |  Read  |  Post a Comment
UK Loan Firm Wonga Suffers Financial Data Breach
Dark Reading Staff, Quick Hits
Customers in the UK and Poland may have had their bank account details compromised.
By Dark Reading Staff , 4/11/2017
Comment1 Comment  |  Read  |  Post a Comment
The New Shadow IT: Custom Data Center Applications
Kaushik Narayan, CTO, Skyhigh NetworksCommentary
If you think youve finally gotten control of unsanctioned user apps, think again. The next wave of rogue apps is on its way from your data center to the cloud.
By Kaushik Narayan CTO, Skyhigh Networks, 4/7/2017
Comment2 comments  |  Read  |  Post a Comment
As Cloud Use Expands, So Do Security Blind Spots, Studies Show
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Three-quarters of IaaS and SaaS apps arent monitored.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/4/2017
Comment2 comments  |  Read  |  Post a Comment
Cybercriminals Seized Control of Brazilian Bank for 5 Hours
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Sophisticated heist compromised major bank's entire DNS infrastructure.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
The Business of Security: How your Organization Is Changing beneath You
John B. Dickson, CISSP,  Principal, Denim GroupCommentary
And why its your job to change with it and skate where the puck is headed.
By John B. Dickson CISSP, Principal, Denim Group, 3/30/2017
Comment1 Comment  |  Read  |  Post a Comment
Cloud Security: New Research Says IT Pros Still Skittish
Steve Zurier, Freelance WriterNews
Respondents complain in two studies that traditional security tools dont work in the cloud, and cant deliver visibility across multiple cloud environments.
By Steve Zurier Freelance Writer, 3/29/2017
Comment2 comments  |  Read  |  Post a Comment
This Week On Dark Reading: Event Calendar
Dark Reading Staff, Commentary
Ransomware remediation and recovery this week, with clouds on the horizon.
By Dark Reading Staff , 3/27/2017
Comment0 comments  |  Read  |  Post a Comment
Intro to Cyber Insurance: 7 Questions to Ask
Kelly Sheridan, Associate Editor, Dark Reading
Buying a cyber insurance policy can be complex and difficult. Make sure you're asking these questions as you navigate the process.
By Kelly Sheridan Associate Editor, Dark Reading, 3/24/2017
Comment10 comments  |  Read  |  Post a Comment
Hacked Sites Up By 32% in 2016 Over 2015, Says Google
Dark Reading Staff, Quick Hits
Webmasters should register on Search Console for hack notifications, advises the company.
By Dark Reading Staff , 3/21/2017
Comment1 Comment  |  Read  |  Post a Comment
US-CERT Warns That HTTPS Inspection Tools Weaken TLS
Sara Peters, Senior Editor at Dark ReadingQuick Hits
Turns out that man-in-the-middling your own traffic isn't the safest way to look for man-in-the-middle attacks.
By Sara Peters Senior Editor at Dark Reading, 3/16/2017
Comment47 comments  |  Read  |  Post a Comment
Trust Begins With Layer 1 Encryption
Hector Menendez, Product Marketing Manager, IP/Optical Networks, NokiaCommentary
In todays distributed environment, cloud and communication service providers can play a key role in providing organizations with a scalable and secure platform for the connection of everything to everything. Heres how.
By Hector Menendez Product Marketing Manager, IP/Optical Networks, Nokia, 3/15/2017
Comment0 comments  |  Read  |  Post a Comment
Twitter Counter Hack Uses Familiar Attack Mode
Steve Zurier, Freelance WriterNews
Experts advise users to be more aware of the potential downside of third-party apps.
By Steve Zurier Freelance Writer, 3/15/2017
Comment0 comments  |  Read  |  Post a Comment
Canada Takes Tax Site Offline After Apache Struts Attacks
Dark Reading Staff, Quick Hits
Hackers exploit vulnerability in Apache Struts 2 software of Statistics Canada but no damage done.
By Dark Reading Staff , 3/14/2017
Comment0 comments  |  Read  |  Post a Comment
Mobile (In)security: Dark Reading Cartoon Caption Contest Winners
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Clever word play on mobile ransomware, cloud and the Internet of Things. And the winners are
By Marilyn Cohodas Community Editor, Dark Reading, 3/9/2017
Comment4 comments  |  Read  |  Post a Comment
Securing Todays 'Elastic Attack Surface'
Amit Yoran, Chairman & CEO, Tenable Network SecurityCommentary
The foundation of good cybersecurity is knowing your network. But as organizations embrace new technologies, that simple task has gotten incredibly difficult.
By Amit Yoran Chairman & CEO, Tenable Network Security, 3/9/2017
Comment1 Comment  |  Read  |  Post a Comment
Trust, Cloud & the Quest for a Glass Wall around Security
Stan Black, CSO, CitrixCommentary
In the next year, were going to see a leap towards strategic, business-level objectives that can be resolved by simplifying infrastructure and granting greater visibility in real time.
By Stan Black CSO, Citrix, 3/8/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by Shantaram
Current Conversations Excellent post, i was happy to find it!
In reply to: 192.168.0.1">Re: Great article! 192.168.0.1
Post Your Own Reply
Posted by forskolinfuel
Current Conversations A nice informative post thanks alot
In reply to: phen375 review web example">Re: phen375 review web example
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.