News & Commentary
Security Leadership & The Art Of Decision Making
Vincent Liu, Partner, Bishop FoxCommentary
What a classically-trained guitarist with a Masters Degree in counseling brings to the table as head of cybersecurity and privacy at one of the worlds major healthcare organizations.
By Vincent Liu Partner, Bishop Fox, 8/24/2016
Comment0 comments  |  Read  |  Post a Comment
Hit-And-Run Tactics Fuel Growth In DDoS Attacks
Jai Vijayan, Freelance writerNews
A majority of organizations in Imperva DDoS study suffer multiple consecutive attacks.
By Jai Vijayan Freelance writer, 8/23/2016
Comment0 comments  |  Read  |  Post a Comment
CISO Security Portfolios Vs. Reporting Structures
Adam Shostack, Founder, Stealth StartupCommentary
Organizational structure is a tool for driving action. Worrying about your bosss title wont help you as much as a better communication framework.
By Adam Shostack Founder, Stealth Startup, 8/23/2016
Comment0 comments  |  Read  |  Post a Comment
Attacker's Playbook Top 5 Is High On Passwords, Low On Malware
Sara Peters, Senior Editor at Dark ReadingNews
Report: Penetration testers' five most reliable methods of compromising targets include four different ways to use stolen credentials, but zero ways to exploit software.
By Sara Peters Senior Editor at Dark Reading, 8/18/2016
Comment1 Comment  |  Read  |  Post a Comment
5 Strategies For Enhancing Targeted Security Monitoring
Jason Sachowski, Director, Security Forensics & Civil Investigations, Scotiabank GroupCommentary
These examples will help you improve early incident detection results.
By Jason Sachowski Director, Security Forensics & Civil Investigations, Scotiabank Group, 8/18/2016
Comment0 comments  |  Read  |  Post a Comment
User Ed: Patching People Vs Vulns
Lysa Myers, Security Researcher, ESETCommentary
How infosec can combine and adapt security education and security defenses to the way users actually do their jobs.
By Lysa Myers Security Researcher, ESET, 8/17/2016
Comment0 comments  |  Read  |  Post a Comment
Substantially Above Par: DR Cartoon Caption Contest Winners
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Critical vulnerabilities, links & virtual reality. And the winner is...
By Marilyn Cohodas Community Editor, Dark Reading, 8/12/2016
Comment0 comments  |  Read  |  Post a Comment
The Future Of ATM Hacking
Sara Peters, Senior Editor at Dark ReadingNews
Research released at Black Hat USA last week shows that one of our best defenses for the future of payment card and ATM security isn't infallible. Here's why.
By Sara Peters Senior Editor at Dark Reading, 8/11/2016
Comment3 comments  |  Read  |  Post a Comment
Theory Vs Practice: Getting The Most Out Of Infosec
Joshua Goldfarb, VP & CTO - Emerging Technologies, FireEyeCommentary
Why being practical and operationally minded is the only way to build a successful security program.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 8/10/2016
Comment0 comments  |  Read  |  Post a Comment
Building A Detection Strategy With The Right Metrics
Giora Engel, VP Product & Strategy, LightCyberCommentary
The tools used in detecting intrusions can lead to an overwhelming number of alerts, but theyre a vital part of security.
By Giora Engel VP Product & Strategy, LightCyber, 8/9/2016
Comment0 comments  |  Read  |  Post a Comment
Data Protection From The Inside Out
Dan Frank, Deloitte Advisory Principal, Cyber Risk ServicesCommentary
Organizations must make fundamental changes in the way they approach data protection.
By Dan Frank Deloitte Advisory Principal, Cyber Risk Services, 8/8/2016
Comment1 Comment  |  Read  |  Post a Comment
DDoS Attacks: Cybercriminals Are More Homegrown Than You Think
Steve Zurier, Freelance WriterNews
Researchers from the FBI and a private security company say many of the distributed denial of service attacks emanate from the West.
By Steve Zurier Freelance Writer, 8/4/2016
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading News Desk Coming Back To Black Hat, Live
Sara Peters, Senior Editor at Dark ReadingNews
Live from Las Vegas: over 40 video interviews with Black Hat USA conference speakers and sponsors. Wednesday Aug. 3, Thursday Aug, 4, starting at 2 p.m. ET.
By Sara Peters Senior Editor at Dark Reading, 8/4/2016
Comment1 Comment  |  Read  |  Post a Comment
8 Alternatives to Selfie Authentication
Terry Sweeney, Contributing Editor
How to definitively prove your identity? A variety of anatomical parts and functions may soon be able to vouch for you.
By Terry Sweeney Contributing Editor, 8/4/2016
Comment0 comments  |  Read  |  Post a Comment
US Navy Organizes Cybersecurity Simulation
Dark Reading Staff, Quick Hits
Naval interns create 'Capture the Flag' challenge to protect US Navy cyberspace.
By Dark Reading Staff , 8/3/2016
Comment0 comments  |  Read  |  Post a Comment
Awareness Improving But Security Still Lags For SAP Implementations
Ericka Chickowski, Contributing Writer, Dark ReadingNews
SAP ecosystem a huge Achilles heel for enterprise system security, report says.
By Ericka Chickowski Contributing Writer, Dark Reading, 8/2/2016
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Radio at Black Hat 2016: 2 Shows, 4 #BHUSA Presenters
Marilyn Cohodas, Community Editor, Dark ReadingCommentary
Even if you can't physically be at Black Hat USA 2016, Dark Reading offers a virtual alternative to engage with presenters about hot show topics and trends.
By Marilyn Cohodas Community Editor, Dark Reading, 8/2/2016
Comment0 comments  |  Read  |  Post a Comment
5 Email Security Tips to Combat Macro-Enabled Ransomware
Sean Martin, CISSP | President, imsmartin
Cybercriminals are increasingly looking to macro variants, leaving organizations to defend against advanced tactics like macro-based malware attacks any way they can.
By Sean Martin CISSP | President, imsmartin, 8/2/2016
Comment3 comments  |  Read  |  Post a Comment
3 Steps Towards Building Cyber Resilience Into Critical Infrastructure
Dana Pasquali, Cybersecurity Product Line Leader, GE Oil & GasCommentary
The integration of asset management, incident response processes and education is critical to improving the industrial control system cybersecurity landscape.
By Dana Pasquali Cybersecurity Product Line Leader, GE Oil & Gas, 8/2/2016
Comment3 comments  |  Read  |  Post a Comment
Crypto Malware: Responding To Machine-Timescale Breaches
Simon Crosby, Co-founder & CTO, BromiumCommentary
The game has changed again with hackers ability to steal your data at record speeds and cripple your organization before the first alert.
By Simon Crosby Co-founder & CTO, Bromium, 8/1/2016
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.