Cloud
News & Commentary
Millennials Could Learn From Baby Boomers When It Comes To Security
Emily Johnson, Associate Editor, UBM AmericasNews
New reports show baby boomers have their millennial children beat when it comes to information security.
By Emily Johnson Associate Editor, UBM Americas, 5/26/2016
Comment0 comments  |  Read  |  Post a Comment
A Newer Variant Of RawPOS: An In-Depth Look
Melia Kelley, Managing Consultant, UnitedLexCommentary
There's no silver bullet for RawPOS prevention, but you can impede RawPOS's ability to execute successfully by understanding how it works.
By Melia Kelley Managing Consultant, UnitedLex, 5/25/2016
Comment2 comments  |  Read  |  Post a Comment
APWG: Phishing Attacks Jump 250% From Oct Through March
Dark Reading Staff, Quick Hits
Quarterly and monthly totals are the highest since the Anti-Phishing Working Group began tracking phishing in 2004.
By Dark Reading Staff , 5/25/2016
Comment0 comments  |  Read  |  Post a Comment
IoT Security By The Numbers
Ericka Chickowski, Contributing Writer, Dark Reading
Some recent stats on adoption rates and perceptions about risks surrounding the Internet of Things.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/19/2016
Comment1 Comment  |  Read  |  Post a Comment
5 Reasons Enterprises Still Worry About Cloud Security
Emily Johnson, Associate Editor, UBM AmericasNews
Cloud spending and adoption has been on the rise for years, but the gap in cloud security confidence still causes pause with enterprises.
By Emily Johnson Associate Editor, UBM Americas, 5/19/2016
Comment0 comments  |  Read  |  Post a Comment
Cloud SLAs: What Everyone Should Know
Jamie Tischart, CTO, Cloud & SaaS Technologies, Intel Security
13 questions to ask your service providers to better understand their service offerings and your risks.
By Jamie Tischart CTO, Cloud & SaaS Technologies, Intel Security, 5/18/2016
Comment0 comments  |  Read  |  Post a Comment
Encryption 101: Covering the Bases
Steve Zurier, Freelance Writer
Here’s an overview of the key encryption types you’ll need to lock down your company’s systems.
By Steve Zurier Freelance Writer, 5/13/2016
Comment0 comments  |  Read  |  Post a Comment
Walmart Sues Visa Over New Debit Card Rules
Dark Reading Staff, Quick Hits
Forced to accept unsecure signatures instead of PIN with new chip-enabled cards, says retail giant.
By Dark Reading Staff , 5/12/2016
Comment0 comments  |  Read  |  Post a Comment
What's Next For Network Security
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
A ‘vanishing’ physical network perimeter in the age of mobile, cloud services, and the Internet of Things, is changing network security as well.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/5/2016
Comment2 comments  |  Read  |  Post a Comment
5 Questions SMBs Should Ask About Cloud Security
Steve Zurier, Freelance WriterNews
Most small companies need help. Start by asking the right questions.
By Steve Zurier Freelance Writer, 5/5/2016
Comment2 comments  |  Read  |  Post a Comment
Online Transaction Fraud To Hit $25.6 Billion By 2020
Dark Reading Staff, Quick Hits
Juniper Research says cybercriminals will move to ‘card not present’ space with focus on ecommerce.
By Dark Reading Staff , 5/5/2016
Comment0 comments  |  Read  |  Post a Comment
The Balancing Act: Government Security In The Cloud
Lance Dubsky, CISSP, CISM, Chief Security Strategist, Americas, at FireEyeCommentary
The cloud offers great opportunities and challenges to public sector security teams defending critical systems against advanced threats. These 7 strategies will help you avoid a worst-case scenario.
By Lance Dubsky, CISSP, CISM Chief Security Strategist, Americas, at FireEye, 5/4/2016
Comment0 comments  |  Read  |  Post a Comment
10 Biggest Mega Breaches Of The Past 10 Years
Ericka Chickowski, Contributing Writer, Dark Reading
These data breaches from Dark Reading's 10-year history boggle the mind in terms of scale and fallout.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/3/2016
Comment0 comments  |  Read  |  Post a Comment
8 Microsoft Office 365 Security Tips To Reduce Data Loss
Sean Martin, CISSP | President, imsmartin
Even with a slew of new security tools and compliance guidance, there are still things you can do to protect this critical business system.
By Sean Martin CISSP | President, imsmartin, 5/2/2016
Comment0 comments  |  Read  |  Post a Comment
Top 10 Web Hacking Techniques For 2015
Ericka Chickowski, Contributing Writer, Dark Reading
The most influential research on vulnerabilities and exploits, as voted on by the security community.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/27/2016
Comment1 Comment  |  Read  |  Post a Comment
Mexican Voter Database Exposed
Dark Reading Staff, Quick Hits
Unsecured database leads to 'leak' of private information of 87 million Mexican voters.
By Dark Reading Staff , 4/26/2016
Comment7 comments  |  Read  |  Post a Comment
Mea Culpa: Time To Build Security Into Connectivity
Mark Hoover, CEO, Vidder, Inc.Commentary
How those of us who spent decades developing faster, easier, and more scalable networking technology have made the lives of our security counterparts a living hell.
By Mark Hoover CEO, Vidder, Inc., 4/21/2016
Comment0 comments  |  Read  |  Post a Comment
Google Finds 800,000 Websites Breached Worldwide
Kelly Jackson Higgins, Executive Editor at Dark ReadingQuick Hits
In the past year, the search engine giant has detected close to 800,000 sites infected with drive-by download malware and other malicious content aimed at nabbing unsuspecting visitors.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/18/2016
Comment2 comments  |  Read  |  Post a Comment
Privacy Debate: Apple & Google Today; AWS or Azure Tomorrow?
Kennet Westby, Founding Partner, President & COO, CoalfireCommentary
Why the recent fight over mobile phone security and encryption is moving to the cloud.
By Kennet Westby Founding Partner, President & COO, Coalfire, 4/18/2016
Comment1 Comment  |  Read  |  Post a Comment
Cloud Stampede Is On, But Who's Watching Security?
Charles Babcock, Editor at Large, CloudNews
A survey by Intel and the Cloud Security Alliance finds that the use of cloud services is increasing, but more in-depth security measures are needed.
By Charles Babcock Editor at Large, Cloud, 4/18/2016
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
8 Key Building Blocks for Enterprise Network Defense
Networks are changing rapidly -- and so are strategies for protecting them. This Tech Digest looks at the fundamentals for the next-gen environment.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In this episode of Dark Reading Radio, veteran CISOs will share their experience and insight into how organizations can get the best bang for their security buck.