Comments
Pragmatic Security: 20 Signs You Are 'Boiling the Ocean'
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
josh@idrra.com
50%
50%
[email protected],
User Rank: Apprentice
3/14/2018 | 3:21:44 PM
Re: Content stagnation
Thank you Daniel - glad the piece resonated with you.
DonT183
50%
50%
DonT183,
User Rank: Black Belt
3/14/2018 | 2:58:53 PM
Resolving the impasse might be less fun
I would be glad to help you collect solutions to the impasse, but documenting the problem might be more fun.
DonT183
50%
50%
DonT183,
User Rank: Black Belt
3/14/2018 | 2:57:11 PM
Solving the impasse
I would be very glad to help you collect solutions to the impasse.  True, feeling hopeless and complaining is more fun that solving it.

 

Don
cybersecurity07
50%
50%
cybersecurity07,
User Rank: Apprentice
3/12/2018 | 7:27:46 AM
Is This Beginning of War in Cyber Space ?


Indian Cyber Army In Talk With News Line on Cyber Space War One click of a hacker can easily undo years of handwork of any organisation, without the need to cross the border. Stealing confidential information, intellectual property and financial data is extremely harmful and paralyses the country's economy. The point to ponder upon is: What if the Indian government supports these patriotic cyber security personnel to provide Information security awareness to contribute to protect the national cyber infrastructure without any monetary benefit?

READ NEWS 
josh@idrra.com
50%
50%
[email protected],
User Rank: Apprentice
3/11/2018 | 6:47:07 AM
Re: Great Article
Thank you Menny.
josh@idrra.com
50%
50%
[email protected],
User Rank: Apprentice
3/11/2018 | 6:46:22 AM
Re: Great article
Best of luck with the situation.
josh@idrra.com
50%
50%
[email protected],
User Rank: Apprentice
3/11/2018 | 6:44:36 AM
Re: Clear and consise
Thank you - very much appreciate your comment.
daniel.smallwood
50%
50%
daniel.smallwood,
User Rank: Author
3/9/2018 | 5:14:31 PM
Content stagnation
Great article, many of these 'signs' resonated with me.  In paticular: Stagnant on content development

In my prior SOC roles I like to think of creating 'Security Context' type content.  This would be content that didn't report to be an alert, but instead help support an investigation.  (Low severity events)

Great stuff!  Thanks Josh!
smith2128
50%
50%
smith2128,
User Rank: Author
3/8/2018 | 10:44:42 PM
Clear and consise
What a great summary.  The facts are clear and consise and hopefully many will take note and action!
KennethD292
50%
50%
KennethD292,
User Rank: Strategist
3/8/2018 | 1:47:19 PM
Great article
Thatnks for describing perfectly the situation I am stepping in to.
Page 1 / 2   >   >>


Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
How to Engage Your Cyber Enemies
Guy Nizan, CEO at Intsights Cyber Intelligence,  12/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20228
PUBLISHED: 2018-12-19
Subsonic V6.1.5 allows internetRadioSettings.view streamUrl CSRF, with resultant SSRF.
CVE-2018-20230
PUBLISHED: 2018-12-19
An issue was discovered in PSPP 1.2.0. There is a heap-based buffer overflow at the function read_bytes_internal in utilities/pspp-dump-sav.c, which allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
CVE-2018-20231
PUBLISHED: 2018-12-19
Cross Site Request Forgery (CSRF) in the two-factor-authentication plugin before 1.3.13 for WordPress allows remote attackers to disable 2FA via the tfa_enable_tfa parameter due to missing nonce validation.
CVE-2018-20227
PUBLISHED: 2018-12-19
RDF4J 2.4.2 allows Directory Traversal via ../ in an entry in a ZIP archive.
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...