Operations

News & Commentary
Cloud Security: Lessons Learned from Intrusion Prevention Systems
Gunter Ollmann, CTO, Security, Microsoft Cloud and AI Division   Commentary
The advancement of AI-driven public cloud technology is changing the game of "protection by default" in the enterprise.
By Gunter Ollmann CTO, Security, Microsoft Cloud and AI Division , 7/17/2018
Comment0 comments  |  Read  |  Post a Comment
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading
Here's how to safeguard three other network foundation protocols so they don't become weapons or critical vulnerabilities.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/16/2018
Comment0 comments  |  Read  |  Post a Comment
Congressional Report Cites States Most Vulnerable to Election Hacking
Dark Reading Staff, Quick Hits
A new report details issues with 18 states along with suggestions on what can be done.
By Dark Reading Staff , 7/13/2018
Comment0 comments  |  Read  |  Post a Comment
SOCs Use Automation to Compensate for Training, Technology Issues
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Executives and front-line SOC teams see human and technology issues in much different ways, according to two new reports.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/13/2018
Comment0 comments  |  Read  |  Post a Comment
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESETCommentary
Establishing an entre into the security world can be a maddeningly slow process. For those of us already here, it can be an opportunity to help others.
By Lysa Myers Security Researcher, ESET, 7/12/2018
Comment2 comments  |  Read  |  Post a Comment
Getting Safe, Smart & Secure on S3
Eric Thomas, Director of Cloud, ExtraHopCommentary
AWS Simple Storage Service has proven to be a security minefield. It doesn't have to be if you pay attention to people, process, and technology.
By Eric Thomas Director of Cloud, ExtraHop, 7/11/2018
Comment0 comments  |  Read  |  Post a Comment
New Cyber Center Opens at Augusta University in Georgia
Dark Reading Staff, Quick Hits
University partners with state on $100 million Georgia Cyber Center for cybersecurity education and research.
By Dark Reading Staff , 7/11/2018
Comment0 comments  |  Read  |  Post a Comment
Apple Releases Wave of Security Updates
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Apple updates software for nearly every hardware platform, though one new feature almost steals the security show.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/11/2018
Comment0 comments  |  Read  |  Post a Comment
Bomgar Acquires Avecto
Dark Reading Staff, Quick Hits
Purchase adds layers to privileged access management system.
By Dark Reading Staff , 7/10/2018
Comment0 comments  |  Read  |  Post a Comment
Businesses Struggle to Build 'Security-First' Culture
Kelly Sheridan, Staff Editor, Dark ReadingNews
New Accenture study finds half of businesses provide cybersecurity training for new hires and only 40% of CISOs prioritize building or expanding insider threat programs.
By Kelly Sheridan Staff Editor, Dark Reading, 7/10/2018
Comment1 Comment  |  Read  |  Post a Comment
7 Ways to Keep DNS Safe
Curtis Franklin Jr., Senior Editor at Dark Reading
A DNS attack can have an outsize impact on the targeted organization or organizations. Here's how to make hackers' lives much more difficult.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/10/2018
Comment2 comments  |  Read  |  Post a Comment
6 M&A Security Tips
Steve Zurier, Freelance Writer
Companies are realizing that the security posture of an acquired organization should be considered as part of their due diligence process.
By Steve Zurier Freelance Writer, 7/9/2018
Comment0 comments  |  Read  |  Post a Comment
Claranet Buys NotSoSecure
Dark Reading Staff, Quick Hits
Reactive or Proactive? Making the Case for New Kill Chains
Ryan Stolte, co-founder and CTO at Bay DynamicsCommentary
Classic kill chain models that aim to find and stop external attacks don't account for threats from insiders. Here what a modern kill chain should include.
By Ryan Stolte co-founder and CTO at Bay Dynamics, 7/6/2018
Comment1 Comment  |  Read  |  Post a Comment
WEF: 217 More Years Until Women and Men Reach Economic Equality
Kelly Sheridan, Staff Editor, Dark ReadingNews
Progress toward economic parity is in reverse for the first time since 2006, but cybersecurity can help change the game.
By Kelly Sheridan Staff Editor, Dark Reading, 7/5/2018
Comment2 comments  |  Read  |  Post a Comment
Bigger, Faster, Stronger: 2 Reports Detail the Evolving State of DDoS
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
DDoS attacks continue to plague the Internet, getting bigger and more dangerous. And now, the kids are involved.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/3/2018
Comment0 comments  |  Read  |  Post a Comment
Consumers Rank Security High in Payment Decisions
Dark Reading Staff, Quick Hits
Security is a top priority when it comes to making decisions on payment methods and technologies.
By Dark Reading Staff , 7/3/2018
Comment1 Comment  |  Read  |  Post a Comment
6 Drivers of Mental and Emotional Stress in Infosec
Kelly Sheridan, Staff Editor, Dark Reading
Pressure comes in many forms but often with the same end result: stress and burnout within the security community.
By Kelly Sheridan Staff Editor, Dark Reading, 7/2/2018
Comment4 comments  |  Read  |  Post a Comment
Botnets Evolving to Mobile Devices
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Millions of mobile devices are now making requests in what's described as "an attack on the economy."
By Curtis Franklin Jr. Senior Editor at Dark Reading, 6/28/2018
Comment0 comments  |  Read  |  Post a Comment
There's No Automating Your Way Out of Security Hiring Woes
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Call it the paradox of cybersecurity automation: It makes your staff more productive but takes more quality experts to make it work.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/28/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Major International Airport System Access Sold for $10 on Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  7/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-3090
PUBLISHED: 2018-07-18
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compr...
CVE-2018-3091
PUBLISHED: 2018-07-18
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compr...
CVE-2018-3092
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...
CVE-2018-3093
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...
CVE-2018-3094
PUBLISHED: 2018-07-18
Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In T...