Attacks/Breaches
5/1/2014
10:25 AM
Tim Wilson
Tim Wilson
Commentary
50%
50%

Dark Reading Celebrates Eighth Anniversary

Now the web's largest online info security community, Dark Reading's 2006 charter hasn't changed: to help security pros do their jobs.

Eight years ago today, Dark Reading posted its first IT security news story, launching an online publication with a single goal: to help security professionals do their jobs.

Today, Dark Reading has evolved dramatically, combining with sister publication InformationWeek to become one of the web's most widely visited online security communities. Over the past five weeks, you've seen radical improvements in our site, including more commentary, new features, and greater interactivity with editors and other readers.

As we enter our ninth year of operation, though, it's important to remember that the core mission of Dark Reading hasn't changed. When we launched in 2006, we wanted to become a very different, more comprehensive and useful sort of site: a place where you can not only read the latest breach and vulnerability news, but also get a sense for how it might affect your enterprise.

We decided to build a news section that focused on problems and issues in the enterprise, not product announcements from vendors. Oh, we still cover technology news -- our Products & Releases section is one of the web's most comprehensive -- but our reporting resources are more focused on the issues that security pros face every day. Thanks to senior editor Kelly Jackson Higgins, we've built a strong relationship with the security research community, helping to connect it with the broader security professional community and adding some light to the complex topic of online vulnerabilities and threats.

We also decided to break through some of the limitations of online publications in 2006, inviting readers to participate in online comments and discussions and posting links to great articles written by rival publications in our Best of Web section. Our idea was to help security pros in their effort to collect useful information from each other and from around the web, so that they could find all the data they need in one place, rather than hunting from site to site.

Today, those basic ideas are still part of Dark Reading. Doing an RFP? Type the name of the technology you're seeking in the Dark Reading "search" field, and you'll get a listing not only of all relevant news and commentary about that technology, but all of the major product announcements in that category. Want to hear others' opinions about a product or vulnerability? Type a comment on a relevant story and you'll get feedback from our editors and your peers.

Over the last eight years, Dark Reading has made it our business, not just to deliver the latest IT security news, but to be responsive to the needs of the security community. Our new publishing platform, as well as our close relationship with sister organizations such as InformationWeek and Black Hat, will make us more responsive than ever. But our basic goal hasn't changed: to help readers do their jobs.

If you have ideas on how we can help you, or how we can better serve the community, please let us know. We hope our ninth year will be our best ever.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
5/1/2014 | 4:20:58 PM
Re: Happy Birthday to a great site, great team, great community
Thank you, Marilyn. We are thrilled to have you on the team and helping build the DR community into something even stronger. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/1/2014 | 12:11:18 PM
Happy Birthday to a great site, great team, great community
I just want to take the opportunity -- as the newest member of the Dark Reading team -- to say how delighted I am to be a part of this great tradition and community. So congratulations and many happy returns to Dark Reading, Tim & Kelly. I also want send a shout out to the Dark Reading community and thank you for your insights and participation in our new community model. With your help,  the next eight years of Dark Reading are sure to be even better.

 
More Blogs from Commentary
'Backoff' Malware: Time To Step Up Remote Access Security
DHS issues advisory about remote desktop access tools associated with recent point-of-sale breaches.
LIVE From Las Vegas: Dark Reading Radio at Black Hat
If you can't physically be at Black Hat USA 2014, Dark Reading offers a virtual alternative where you can engage with presenters and attendees about hot show topics and trends.
InfoSec’s Holy Grail: Data Sharing & Collaboration
Despite all the best intentions, cooperation around Internet security is still a work in progress. Case in point: Microsoft’s unilateral action against No-IP.
Phishing: What Once Was Old Is New Again
I used to think the heyday of phishing had passed. But as Symantec notes in its 2014 Internet Security Threat Report, I was wrong!
Dark Reading Radio: Data Loss Prevention (DLP) Fail
Learn about newly found vulnerabilities in commercial and open-source DLP software in our latest episode of Dark Reading Radio with security researchers Zach Lanier and Kelly Lum.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio