Risk // Compliance
News & Commentary
Privacy Shield: Can the US Earn the EU’s Trust Post Apple vs. FBI?
Peter Merkulov, VP, Product Strategy & Technology AlliancesCommentary
Rebuilding the privacy framework for data transfer between the US and its European trading partners won’t be easy but it’s still a worthwhile effort.
By Peter Merkulov VP, Product Strategy & Technology Alliances, 6/20/2016
Comment2 comments  |  Read  |  Post a Comment
How Secure is Secure? Tips For Investing In The Right Strategy
Pritesh Parekh, VP & Chief Security Officer, ZuoraCommentary
Business alignment, defense-in-depth and a phased approach are three principles to follow when building out a solid security program.
By Pritesh Parekh VP & Chief Security Officer, Zuora, 6/17/2016
Comment1 Comment  |  Read  |  Post a Comment
What CISOs Need to Tell The Board About Cyber Risk
Chris Veltsos,  Associate Professor, Minnesota State University, MankatoCommentary
To avoid devastating financial losses, boards and the C-suite must have a deep understating of the cyber risks their organizations’ face. Here’s what they need to hear from the security team
By Chris Veltsos Associate Professor, Minnesota State University, Mankato, 6/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Preliminary Agreement Reached On Airline Cybersecurity
Dark Reading Staff, Quick Hits
Panel likely to propose broad package of cyber protection including cockpit alarms, say sources.
By Dark Reading Staff , 6/14/2016
Comment0 comments  |  Read  |  Post a Comment
12 Tips for Securing Cyber Insurance Coverage
Sean Martin, CISSP | President, imsmartin
As cyber insurance grows more available and popular it is also becoming increasingly complex and confusing. Our slideshow offers guidelines on how to get insurance, get decent coverage, and avoid limitations in coverage.
By Sean Martin CISSP | President, imsmartin, 6/13/2016
Comment0 comments  |  Read  |  Post a Comment
Cloud Apps Just As Secure As On-Premise Apps, Say InfoSec Pros
Sara Peters, Senior Editor at Dark ReadingNews
Unfortunately, 75% of cloud apps will still fall afoul of the new EU General Data Protection Regulation, according to new studies.
By Sara Peters Senior Editor at Dark Reading, 6/9/2016
Comment0 comments  |  Read  |  Post a Comment
G7 Global Finance Leaders Push Cybersecurity Framework
Dark Reading Staff, Quick Hits
At G7 meeting, US Treasury official says cybercrime issues 'not going away.'
By Dark Reading Staff , 5/23/2016
Comment0 comments  |  Read  |  Post a Comment
Cyber Security A Major Risk To US Financial System: SEC Chief
Dark Reading Staff, Quick Hits
Mary Jo White believes that despite preparedness, procedures in place to fight cyberattacks are inadequate.
By Dark Reading Staff , 5/20/2016
Comment1 Comment  |  Read  |  Post a Comment
Bangladesh Bank Theft: New York Fed Stands By Transfer Procedures
Dark Reading Staff, Quick Hits
Bank replies to US lawmaker query whether transfer of funds should have been blocked.
By Dark Reading Staff , 5/16/2016
Comment0 comments  |  Read  |  Post a Comment
Enterprises Must Consider Privacy Concern For Biometrics
Ericka Chickowski, Contributing Writer, Dark ReadingNews
On-server storage and processing of biometric authentication presents a host of regulatory and corporate responsibility issues.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/12/2016
Comment3 comments  |  Read  |  Post a Comment
10 Biggest Mega Breaches Of The Past 10 Years
Ericka Chickowski, Contributing Writer, Dark Reading
These data breaches from Dark Reading's 10-year history boggle the mind in terms of scale and fallout.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/3/2016
Comment0 comments  |  Read  |  Post a Comment
PCI DSS 3.2: 3 Things You Need to Know
Steve Zurier, Freelance WriterNews
The latest round of upgrades are incremental yet necessary.
By Steve Zurier Freelance Writer, 4/27/2016
Comment0 comments  |  Read  |  Post a Comment
10 Things Cyber Insurance Won't Cover
Ericka Chickowski, Contributing Writer, Dark Reading
Cyber insurance policies come with some important caveats to keep in mind.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/14/2016
Comment1 Comment  |  Read  |  Post a Comment
EU Privacy Officials Push Back On Privacy Shield
Sara Peters, Senior Editor at Dark ReadingNews
Better than Safe Harbor, but not good enough. Should we care what they think?
By Sara Peters Senior Editor at Dark Reading, 4/13/2016
Comment1 Comment  |  Read  |  Post a Comment
Managing The Message Before The Breach
Tom Bowers, Chief Security Strategist, ePlus TechnologiesCommentary
No leader wants to see their company exploited by creative cyber villains. Here’s how CISOs can stay ahead of the game with a strategic plan.
By Tom Bowers Chief Security Strategist, ePlus Technologies, 4/12/2016
Comment0 comments  |  Read  |  Post a Comment
Context & Awareness: It’s All About The Apps
Curtis Dalton, SVP & Global Head of Security Services for Pactera US (a Blackstone portfolio company)Commentary
Why data context, application awareness and training are keys to mitigating security risks,
By Curtis Dalton SVP & Global Head of Security Services for Pactera US (a Blackstone portfolio company), 4/7/2016
Comment0 comments  |  Read  |  Post a Comment
Avoiding Legal Landmines in Data Breach Response
Jason Straight, Senior VP & Chief Privacy Officer, UnitedLexCommentary
Building a legally defensible cybersecurity program means seeking out guidance from legal advisors before a serious incident forces you together.
By Jason Straight Senior VP & Chief Privacy Officer, UnitedLex, 4/4/2016
Comment4 comments  |  Read  |  Post a Comment
Raising The Stakes For Application Security
Jeremiah Grossman, Commentary
Why, if we already know most everything we need to know about exploited vulnerabilities in software, do hacks keep happening?
By Jeremiah Grossman , 4/1/2016
Comment0 comments  |  Read  |  Post a Comment
6 Hot Cybersecurity Startups: MACH37’s Spring Class Of 2016
Marilyn Cohodas, Community Editor, Dark Reading
Intense 90-day program mentors budding entrepreneurs in the finer points of developing a viable technology business for the real world of information security.
By Marilyn Cohodas Community Editor, Dark Reading, 3/28/2016
Comment0 comments  |  Read  |  Post a Comment
Why You Can't Ignore Privacy Shield
Sara Peters, Senior Editor at Dark ReadingNews
Trans-Atlantic transfer of Europeans' personal data might not have concerned you in the past, but here are eight things you need to know now.
By Sara Peters Senior Editor at Dark Reading, 3/17/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by RobbyF912
Current Conversations Nice tips!
In reply to: goo article
Post Your Own Reply
More Conversations
Register for Dark Reading Newsletters
White Papers
Current Issue
How To Build An Effective Defense Against Ransomware
A compendium of Dark Reading´s best recent coverage of ransomware attacks, as well as best practices for defending your enterprise against them.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers