Operations
News & Commentary
Big Data & The Security Skills Shortage
Peter Schlampp, VP of Products, PlatforaCommentary
Finding a security analyst with the data discovery experience to combat modern threats is like searching for the mythical unicorn. The person does not exist
By Peter Schlampp VP of Products, Platfora, 4/29/2015
Comment4 comments  |  Read  |  Post a Comment
Twitter's Top 10 Social CISOs
Marilyn Cohodas, Community Editor, Dark Reading
If you work in information security today, you're on Twitter. Or are you?
By Marilyn Cohodas Community Editor, Dark Reading, 4/27/2015
Comment0 comments  |  Read  |  Post a Comment
As Malware Surges, U.S. Remains Biggest Source of Attacks
Jai Vijayan, Freelance writerNews
The country leads others in malicious IP, URLs and phishing sites.
By Jai Vijayan Freelance writer, 4/24/2015
Comment7 comments  |  Read  |  Post a Comment
Cybersecurity: Don’t Bank On It With 3rd Parties
Greg Dickinson, CEO, HiperosCommentary
Not knowing that a contractor’s employee had access to system passwords is not a valid excuse when your client’s records are stolen.
By Greg Dickinson CEO, Hiperos, 4/24/2015
Comment1 Comment  |  Read  |  Post a Comment
From The RSA Keynote Stage, Day Two
Sara Peters, Senior Editor at Dark ReadingNews
A 9-year-old CEO hacker, a record-breaking swimmer, and a variety of ideas about data-driven security hit the RSA stage.
By Sara Peters Senior Editor at Dark Reading, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
BBVA CISOs Give Tips For Securing 'Digital Bank'
Sara Peters, Senior Editor at Dark ReadingNews
At RSA conference today, CISOs at the multinational financial organization describe security strategy.
By Sara Peters Senior Editor at Dark Reading, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
RSA: Follow Keynote Sessions on Dark Reading
Sara Peters, Senior Editor at Dark ReadingNews
From the Cryptographer's Panel to the RSA CEO's advice for the security industry, here's how the conference kicked off in San Francisco Tuesday.
By Sara Peters Senior Editor at Dark Reading, 4/21/2015
Comment2 comments  |  Read  |  Post a Comment
Health Insurers’ Digital Footprint Widening Attack Surface
Peter Zavlaris, Analyst, RiskIQCommentary
Insurers are ripe targets for attackers since they’re efficient concentrators of every kind of data needed for identity theft, credit card and insurance fraud. Here’s proof.
By Peter Zavlaris Analyst, RiskIQ, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
Why Standardized Threat Data Will Help Stop the Next Big Breach
Bill Nelson, President & CEO, Financial Services Information Sharing and Analysis Center (FS-ISAC) and CEO, SoltraCommentary
Adopting industry standards for threat intelligence will reduce a lot of the heavy lifting and free cyber security first responders to focus on what they do best.
By Bill Nelson President & CEO, Financial Services Information Sharing and Analysis Center (FS-ISAC) and CEO, Soltra, 4/15/2015
Comment0 comments  |  Read  |  Post a Comment
Setting Security Professionals Up For Success
Joshua Goldfarb, VP & CTO - Americas, FireEye.Commentary
People, process, and technology are all integral to a successful infosec program. What’s too often missing involves the concept of workflow.
By Joshua Goldfarb VP & CTO - Americas, FireEye., 4/14/2015
Comment2 comments  |  Read  |  Post a Comment
Better Together: Network Operations & Infosec
Steve Riley, Technical Leader, Office of the CTO, Riverbed TechnologyCommentary
Getting networking and information security teams together in the same room is a critical step for companies that want to build a continuous information security culture.
By Steve Riley Technical Leader, Office of the CTO, Riverbed Technology, 4/13/2015
Comment0 comments  |  Read  |  Post a Comment
Insider Threats: Focus On The User, Not The Data
Daniel Velez, Insider Threat Operations, Raytheon Cyber ProductsCommentary
Global cybersecurity spending will hit almost $77 billion in 2015, so why are there more high-profile leaks than ever?
By Daniel Velez Insider Threat Operations, Raytheon Cyber Products, 4/10/2015
Comment2 comments  |  Read  |  Post a Comment
Beebone Botnet Taken Down By Another Security Team-Up
Sara Peters, Senior Editor at Dark ReadingNews
Small in scale, but high in sophistication, the Beebone botnet and polymorphic downloader is disrupted by an international, public-private effort.
By Sara Peters Senior Editor at Dark Reading, 4/9/2015
Comment6 comments  |  Read  |  Post a Comment
5 Reasons You 'Better Call Saul' To Protect Corporate Data
Corey Nachreiner, Director, Security Strategy & Research, WatchGuard TechnologiesCommentary
These pop-culture lessons from the entertaining Breaking Bad spinoff will make security awareness training both fun and effective.
By Corey Nachreiner Director, Security Strategy & Research, WatchGuard Technologies, 4/8/2015
Comment3 comments  |  Read  |  Post a Comment
Cyber War Games: Top 3 Lessons Learned About Incident Response
Sara Peters, Senior Editor at Dark ReadingNews
Deloitte Cyber Risk Service stages executive war games to show what might happen in the C-Suite after a breach.
By Sara Peters Senior Editor at Dark Reading, 4/7/2015
Comment2 comments  |  Read  |  Post a Comment
So, You 'Don’t Believe In' Security Education?
Joe Ferrara,  President & CEO, Wombat Security TechnologiesCommentary
You're in the minority for a reason. Here's why.
By Joe Ferrara President & CEO, Wombat Security Technologies, 4/7/2015
Comment9 comments  |  Read  |  Post a Comment
Obama’s War On Hackers
Jeremiah Grossman, Commentary
Cybersecurity legislation, for the most part, is a good idea. But not without protections for bug bounty programs and other vital, proactive security research.
By Jeremiah Grossman , 4/6/2015
Comment2 comments  |  Read  |  Post a Comment
The Good & Bad Of BYOD
Michele Chubirka, Security ArchitectCommentary
BYOD has very little to do with technology and everything to do with security, organizational politics, and human psychology.
By Michele Chubirka Security Architect, 4/3/2015
Comment4 comments  |  Read  |  Post a Comment
8 Identity & Access Metrics To Manage Breach Risks
Ericka Chickowski, Contributing Writer, Dark Reading
Measurables for improving security posture around access controls.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/2/2015
Comment0 comments  |  Read  |  Post a Comment
Spring Cleaning In The SOC: Focus On the Inside Threat
Jason Straight, Senior VP & Chief Privacy Officer, UnitedLexCommentary
Along with warmer weather and melting snow, spring brings the perfect opportunity for user engagement. Here’s how to transform insiders into your most sophisticated security device.
By Jason Straight Senior VP & Chief Privacy Officer, UnitedLex, 4/1/2015
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.