Meet 5 Women Shaping Microsoft's Security Strategy
12 Free, Ready-to-Use Security Tools
12 AppSec Activities Enterprises Can't Afford to Skip
7 Steps to Start Your Risk Assessment
7 Most Prevalent Phishing Subject Lines
News & Commentary
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Speaking at the Gartner Symposium/ITxpo, analyst Peter Firstbrook's list of trends is likely to inform executive committee conversations for the next 12 months.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training
Kelly Sheridan, Staff Editor, Dark ReadingNews
A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education.
By Kelly Sheridan Staff Editor, Dark Reading, 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
Millions of Voter Records Found for Sale on the Dark Web
Dark Reading Staff, Quick Hits
Voter registration databases from 19 US states are being hawked in an underground hacking forum, researchers say.
By Dark Reading Staff , 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
3 Out of 4 Employees Pose a Security Risk
Steve Zurier, Freelance WriterNews
New MediaPRO study also finds that management performed worse than entry- and mid-level employees in how to handle a suspected phishing email.
By Steve Zurier Freelance Writer, 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
DoD Travel System Breach Exposed Data of 30K Civilian, Military Employees
Dark Reading Staff, Quick Hits
Defense Dept. says contractor that handles travel management services was hacked.
By Dark Reading Staff , 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
4 Ways to Fight the Email Security Threat
Asaf Cidon, Vice President, Content Security Services, at Barracuda NetworksCommentary
It's time to reimagine employee training with fresh, more aggressive approaches that better treat email security as a fundamentally human problem.
By Asaf Cidon Vice President, Content Security Services, at Barracuda Networks, 10/15/2018
Comment0 comments  |  Read  |  Post a Comment
Most IT Security Pros Want to Change Jobs
Dark Reading Staff, Quick Hits
They cite five main reasons for wanting to move on and what it would take to retain them.
By Dark Reading Staff , 10/12/2018
Comment2 comments  |  Read  |  Post a Comment
Facebook Update: 30 Million Users Actually Hit in its Recent Breach
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
The good news: That number is less than the original estimate of 50 million. The bad news: It might not have been the only attack.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/12/2018
Comment0 comments  |  Read  |  Post a Comment
Threat Hunters & Security Analysts: A Dynamic Duo
Rick Costanzo, CEO, RANK SoftwareCommentary
Fighting spying with spying, threat hunters bring the proactive mindset of network reconnaissance and repair to the enterprise security team.
By Rick Costanzo CEO, RANK Software, 10/12/2018
Comment1 Comment  |  Read  |  Post a Comment
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer
There's no excuse for not knowing your exposure. These free tools can help you analyze what your company is up against and point ways to developing a more thorough security program.
By Steve Zurier Freelance Writer, 10/12/2018
Comment2 comments  |  Read  |  Post a Comment
Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Many organizations have yet to create an effective cybersecurity strategy and it's costing them millions.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 10/11/2018
Comment1 Comment  |  Read  |  Post a Comment
Chinese Intelligence Officer Under Arrest for Trade Secret Theft
Jai Vijayan, Freelance writerNews
Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.
By Jai Vijayan Freelance writer, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Window Snyder Shares Her Plans for Intel Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.
By Kelly Sheridan Staff Editor, Dark Reading, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Most Malware Arrives Via Email
Dark Reading Staff, Quick Hits
Watch out for messages with the word "invoice" in the subject line, too.
By Dark Reading Staff , 10/11/2018
Comment1 Comment  |  Read  |  Post a Comment
Google Adds New Identity, Security Tools to Cloud Platform
Kelly Sheridan, Staff Editor, Dark ReadingNews
A wave of cloud news includes new tools for identity and access management and policies for stronger controls on cloud resources.
By Kelly Sheridan Staff Editor, Dark Reading, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Not All Multifactor Authentication Is Created Equal
Alexandre Cagnoni, Director of Authentication at WatchGuard TechnologiesCommentary
Users should be aware of the strengths and weaknesses of the various MFA methods.
By Alexandre Cagnoni Director of Authentication at WatchGuard Technologies, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
One-Third of US Adults Hit with Identity Theft
Dark Reading Staff, Quick Hits
That's double the global average and more than three times the rate of French and German adults.
By Dark Reading Staff , 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
The Better Way: Threat Analysis & IIoT Security
Satish Gannu, Chief Security Officer, ABBCommentary
Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.
By Satish Gannu Chief Security Officer, ABB, 10/11/2018
Comment0 comments  |  Read  |  Post a Comment
Meet 5 Women Shaping Microsoft's Security Strategy
Kelly Sheridan, Staff Editor, Dark Reading
Profiles of some of the women currently leading Microsoft security operations - and their efforts to drive inclusivity.
By Kelly Sheridan Staff Editor, Dark Reading, 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
Russian Hacking Groups Intersect in Recent Cyberattacks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Two different hacking teams best known as Turla and Fancy Bear employed the same stealthy attack method in an unusual overlap of hacking activity.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/10/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Cloud Misconceptions Are Pervasive Across Enterprises
Shadow IT is rampant at many organizations that rely upon cloud-delivered tools and services to enable remote work, according to a new study. Here's what security teams need to do about it. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Boosting Security Effectiveness with 'Adjuvants'
How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program. Read >>
Partner Perspectives
What's This?
Partner Perspectives
What's This?
Partner Perspectives
What's This?
WanaCrypt0r Hits Worldwide
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack. Read >>
Partner Perspectives
What's This?
Endpoint Security: Putting The Focus On What Matters
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program. Read >>
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
White Papers
Current Issue
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.
CVE-2018-18377
PUBLISHED: 2018-10-16
goform/setReset on Orange AirBox Y858_FL_01.16_04 devices allows attackers to reset a router to factory settings, which can be used to login using the default admin:admin credentials.
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Flash Poll
Video
Slideshows
Twitter Feed