Endpoint Security: Putting The Focus On What Matters
Manish Patel, Senior Product Marketing Manager, TenableCommentary
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program.
By Manish Patel Senior Product Marketing Manager, Tenable, 10/29/2015
Comment1 Comment  |  Read  |  Post a Comment
Are You Making This Endpoint Security Mistake?
Manish Patel, Senior Product Marketing Manager, TenableCommentary
Detecting threats isnt enough. You must also remediate vulnerable endpoints and employ continuous monitoring to reduce exposure.
By Manish Patel Senior Product Marketing Manager, Tenable, 10/19/2015
Comment0 comments  |  Read  |  Post a Comment
Asset Segmentation: The Key To Control
Ted Gary, Product Marketing Manager, TenableCommentary
Automated asset segmentation and classification helps focus strong security controls where they are needed most.
By Ted Gary Product Marketing Manager, Tenable, 10/15/2015
Comment0 comments  |  Read  |  Post a Comment
3 Steps To Knowing Your Network
Ted Gary, Product Marketing Manager, TenableCommentary
Managing your IT assets is a daily effort requiring vigilance and persistence.
By Ted Gary Product Marketing Manager, Tenable, 9/29/2015
Comment0 comments  |  Read  |  Post a Comment
Buyer Beware: How To Avoid Getting Sucked Into Shelfware
Gavin Millard, Technical Director, EMEA, Tenable Network SecurityCommentary
Three simple questions can help ensure you get the most value out of your information security investments.
By Gavin Millard Technical Director, EMEA, Tenable Network Security, 9/22/2015
Comment0 comments  |  Read  |  Post a Comment
Why Is Endpoint Security Failing?
Manish Patel, Senior Product Marketing Manager, TenableCommentary
Endpoint security assurance is not just about detecting threats, but about building a more effective endpoint security program.
By Manish Patel Senior Product Marketing Manager, Tenable, 9/17/2015
Comment2 comments  |  Read  |  Post a Comment
Get Fit: Remove Security Weaknesses
Ted Gary, Product Marketing Manager, TenableCommentary
Preventing problems by strengthening security is often more effective and less expensive than reacting to breaches after they occur.
By Ted Gary Product Marketing Manager, Tenable, 9/10/2015
Comment0 comments  |  Read  |  Post a Comment
Your Worst Day In IT
David Spark, Veteran Tech journalist and founder of Spark Media SolutionsCommentary
Turns out the most common culprits aren't what you might think.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
Flash: Web Browser Plugins Are Vulnerable
Gavin Millard, Technical Director, EMEA, Tenable Network SecurityCommentary
Maybe its time to uninstall Flash for those that dont need it and continuously monitor those that do.
By Gavin Millard Technical Director, EMEA, Tenable Network Security, 8/27/2015
Comment1 Comment  |  Read  |  Post a Comment
How Much Threat Intelligence Is Too Much?
Steve Hall, VP of Product Marketing, Tenable Network Security, Inc.Commentary
Turn your threat data into actionable intelligence by focusing on what is relevant to you and your organization.
By Steve Hall VP of Product Marketing, Tenable Network Security, Inc., 8/20/2015
Comment0 comments  |  Read  |  Post a Comment
How Can We Work Smarter In Security?
David Spark, Veteran Tech journalist and founder of Spark Media SolutionsCommentary
Attendees at the 2015 Black Hat Conference in Las Vegas weigh in.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 8/11/2015
Comment0 comments  |  Read  |  Post a Comment
What Should the Users of Ashley Madison Do?
David Spark, Veteran Tech journalist and founder of Spark Media SolutionsCommentary
Security-minded professionals offer their advice at Black Hat party.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 8/6/2015
Comment2 comments  |  Read  |  Post a Comment
What 30 Classic Games Can Teach Us about Security
David Spark, Veteran Tech journalist and founder of Spark Media SolutionsCommentary
Information security experts share their thoughts on how participating in games and sports helped hone their professional skills.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 7/28/2015
Comment3 comments  |  Read  |  Post a Comment
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Its family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable identifies all types of risk on the network — including missing patches, malware and intruders, missing configurations and missing monitoring — so customers can make informed decisions about where they are exposed. Its products reach across cloud, virtual, mobile and traditional IT systems and measure attack vectors in each of these domains. Tenable’s continuous network monitoring solution measures organizations’ compliance in real-time. This ensures that gaps in security coverage and lapses in security programs get detected and prioritized immediately. Tenable is relied upon by many of the world’s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense.
Featured Writers
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17229
PUBLISHED: 2018-09-19
Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
CVE-2018-17230
PUBLISHED: 2018-09-19
Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
CVE-2018-17231
PUBLISHED: 2018-09-19
** DISPUTED ** Telegram Desktop (aka tdesktop) 1.3.14 might allow attackers to cause a denial of service (assertion failure and application exit) via an "Edit color palette" search that triggers an "index out of range" condition. NOTE: this issue is disputed by multiple third par...
CVE-2018-17228
PUBLISHED: 2018-09-19
nmap4j 1.1.0 allows attackers to execute arbitrary commands via shell metacharacters in an includeHosts call.
CVE-2018-8889
PUBLISHED: 2018-09-19
A directory traversal vulnerability in the Connect Service of the BlackBerry Enterprise Mobility Server (BEMS) 2.8.17.29 and earlier could allow an attacker to retrieve arbitrary files in the context of a BEMS administrator account.