An Industry In Transition: Key Tech Trends In 2018
Shehzad Merchant, Chief Technology Officer, GigamonCommentary
Get Smart About Network Segmentation & Traffic Routing
Jack Hamm, Sr. Manager, Security Operations, GigamonCommentary
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.
By Jack Hamm Sr. Manager, Security Operations, Gigamon, 5/21/2018
Comment0 comments  |  Read  |  Post a Comment
Report: More Breaches Despite Increasing Security Budgets
Graham Melville, Senior Director, Solutions Marketing, GigamonCommentary
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.
By Graham Melville Senior Director, Solutions Marketing, Gigamon, 5/8/2018
Comment0 comments  |  Read  |  Post a Comment
3 Ways to Maximize Security and Minimize Business Challenges
Jack Hamm, Sr. Manager, Security Operations, GigamonCommentary
The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change.
By Jack Hamm Sr. Manager, Security Operations, Gigamon, 4/30/2018
Comment0 comments  |  Read  |  Post a Comment
IDS & IPS: Two Essential Security Measures
Diana Shtil, Senior Manager, Product Marketing, GigamonCommentary
To protect business networks, one line of security isn't enough.
By Diana Shtil Senior Manager, Product Marketing, Gigamon, 4/23/2018
Comment0 comments  |  Read  |  Post a Comment
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
gigamon: Partner Perspectives
Gigamon is the company driving the convergence of networking and security. We help make more threats visible, deploy resources more efficiently and maximize performance of your network and security tools.
Featured Writers
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17229
PUBLISHED: 2018-09-19
Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
CVE-2018-17230
PUBLISHED: 2018-09-19
Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
CVE-2018-17231
PUBLISHED: 2018-09-19
** DISPUTED ** Telegram Desktop (aka tdesktop) 1.3.14 might allow attackers to cause a denial of service (assertion failure and application exit) via an "Edit color palette" search that triggers an "index out of range" condition. NOTE: this issue is disputed by multiple third par...
CVE-2018-17228
PUBLISHED: 2018-09-19
nmap4j 1.1.0 allows attackers to execute arbitrary commands via shell metacharacters in an includeHosts call.
CVE-2018-8889
PUBLISHED: 2018-09-19
A directory traversal vulnerability in the Connect Service of the BlackBerry Enterprise Mobility Server (BEMS) 2.8.17.29 and earlier could allow an attacker to retrieve arbitrary files in the context of a BEMS administrator account.