DRTV
So You Think You Know Risk Management
So You Think You Know Risk Management
Dark Reading Videos  |  10/23/2014  | 
Infosec officers are coming around to the idea that their job is more about managing risk than putting the entire organization on permanent lockdown. But do security pros understand risk management as well as they think they do?
Compliance Is A Start, Not The End
Compliance Is A Start, Not The End
Dark Reading Videos  |  10/21/2014  | 
Regulatory compliance efforts may help you get a bigger budget and reach a baseline security posture. But "compliant" does not necessarily mean "secure."
Open Source v. Closed Source: What's More Secure?
Open Source v. Closed Source: What's More Secure?
Dark Reading Videos  |  10/17/2014  | 
In the wake of Shellshock and Heartbleed, has the glow of open-source application security dimmed?
Why Don't IT Generalists Understand Security?
Why Don't IT Generalists Understand Security?
Dark Reading Videos  |  10/8/2014  | 
Why doesn't the rest of the IT department understand what encryption and passwords can and can't do? And does it matter?
Breach Awareness Made Easy
Breach Awareness Made Easy
Dark Reading Videos  |  9/26/2014  | 
What if companies had to disclose breach history in the same way food companies display nutritional information?
Mobile Device Security Isn't All About Devices
Mobile Device Security Isn't All About Devices
Dark Reading Videos  |  9/19/2014  | 
Roberto Medrano, executive vice president of SOA Software, explains why securing mobile applications and APIs is so essential.
The Failures of Internet Governance
The Failures of Internet Governance
Dark Reading Videos  |  4/28/2014  | 
Snooping and cybercrime exacerbate the problem of having a world without borders inside a world with many borders.
Advanced Persistent Threats: What Are They, Really?
Advanced Persistent Threats: What Are They, Really?
Dark Reading Videos  |  4/4/2014  | 
There seem to be as many definitions of APT as there are actual APTs. So what is an advanced persistent threat, really?
What Is The FIDO Alliance?
What Is The FIDO Alliance?
Dark Reading Videos  |  4/2/2014  | 
Phillip Dunkelberger of Nok Nok Labs explains why its proposed specifications will transform computing.
Top Advice for CISOs
Top Advice for CISOs
Dark Reading Videos  |  3/31/2014  | 
Some of the soft skills are the hardest ones for CISOs to deploy.
Richard Clarke: Snowden Should Be in Prison
Richard Clarke: Snowden Should Be in Prison
Dark Reading Videos  |  3/28/2014  | 
Former White House cybersecurity advisor says Edward Snowden has jeopardized the United States' national security.
Welcome To The New Dark Reading
Welcome To The New Dark Reading
Dark Reading Videos  |  3/27/2014  | 
Check out Dark Reading's Tim Wilson and Kelly Jackson Higgins talking about the reason behind the re-launch.
Richard Clarke: Foreign Governments Not So Surprised by US Snooping
Richard Clarke: Foreign Governments Not So Surprised by US Snooping
Dark Reading Videos  |  3/27/2014  | 
Former White House cybersecurity advisor thinks foreign governments' outrage is largely an act.
Finally, Plug & Play Authentication!
Finally, Plug & Play Authentication!
Dark Reading Videos  |  3/26/2014  | 
FIDO Alliance technology will allow enterprises to replace passwords with plug-and-play multifactor authentication.
How to Solve the Security Skills Shortage
How to Solve the Security Skills Shortage
Dark Reading Videos  |  3/26/2014  | 
At RSA, security professionals weighed in on how to close the security skills gap -- if there is one -- and solve staffing problems.
Why FIDO Alliance Standards Will Kill Passwords
Why FIDO Alliance Standards Will Kill Passwords
Dark Reading Videos  |  2/18/2014  | 
Phillip Dunkelberger of Nok Nok Labs tells why the time is finally ripe for a password-free computing experience.
Why FIDO Alliance Standards Will Kill Passwords
Why FIDO Alliance Standards Will Kill Passwords
Dark Reading Videos  |  2/17/2014  | 
Phillip Dunkelberger of Nok Nok Labs tells why the time is finally ripe for a password-free computing experience.
How & Why Cloud Security Will Empower Users
How & Why Cloud Security Will Empower Users
Dark Reading Videos  |  1/27/2014  | 
Cloud computing growth means big changes for enterprises of all sizes and in all markets.
How & Why Cloud Security Will Empower Users
How & Why Cloud Security Will Empower Users
Dark Reading Videos  |  1/24/2014  | 
Cloud computing growth means big changes for enterprises of all sizes and in all markets.
What Next-Gen Security Looks Like
What Next-Gen Security Looks Like
Dark Reading Videos  |  12/9/2013  | 
The nightmare of BYOD is giving rise to a new generation of intelligent, highly scalable security products and platforms.
What Next-Gen Security Looks Like
What Next-Gen Security Looks Like
Dark Reading Videos  |  12/2/2013  | 
The nightmare of BYOD is giving rise to a new generation of intelligent, highly scalable security products and platforms.
BYOD Network & Security at GITEX 2013, Dubai
BYOD Network & Security at GITEX 2013, Dubai
Dark Reading Videos  |  10/28/2013  | 
Asfar Zaidi of Huawei Enterprise talks about the latest BYOD solutions in the industry.
NSA Director Speaks Out About Agency's Newly Revealed Surveillance Programs
NSA Director Speaks Out About Agency's Newly Revealed Surveillance Programs
Dark Reading Videos  |  8/9/2013  | 
Gen. Keith Alexander told Black Hat USA attendees how leaked surveillance programs helped derail specific terror plots
Appthority & The Mobile Enterprise
Appthority & The Mobile Enterprise
Dark Reading Videos  |  10/9/2012  | 
Some of the most innovative new enterprise technologies come from start-ups, but doing business with them can be risky, given their unproven products and short track records. With Anthony Bettini, Co-Founder and CEO of Appthority.
McAfee Adds Scale, VMWare Support To Security Platform
McAfee Adds Scale, VMWare Support To Security Platform
Dark Reading Videos  |  5/8/2012  | 
McAfee announced three new additions to its security family at Interop in Las Vegas this week, including an improvement in performance and scalability, and some enhancements to its support for virtual environments.
Anatomy of a Zero Day Attack
Anatomy of a Zero Day Attack
Dark Reading Videos  |  10/1/2011  | 
Pacific Northwest National Laboratory CIO, Jerry Johnson, provides some lessons learned from the attacks on his organization in July -- a highly publicized attack on an organization that provides cyber security services for the Dept. of Engergy.
WhisperCore Mitigates Risks Of Android In Businesses
WhisperCore Mitigates Risks Of Android In Businesses
Dark Reading Videos  |  8/11/2011  | 
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.
MANDIANT CSO Talks Threats To His Company and His Clients
MANDIANT CSO Talks Threats To His Company and His Clients
Dark Reading Videos  |  8/10/2011  | 
Richard Bejtlich, CSO and VP of managed services, sits down with Dark Reading's Kelly Jackson Higgins at Black Hat USA to talk about the two hats he wears at the incident response company, and trends in attacks against enterprises and security firms.


Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8243
Published: 2014-11-01
Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote a...

CVE-2014-8244
Published: 2014-11-01
Linksys SMART WiFi firmware on EA2700 and EA3500 devices; before 2.1.41 build 162351 on E4200v2 and EA4500 devices; before 1.1.41 build 162599 on EA6200 devices; before 1.1.40 build 160989 on EA6300, EA6400, EA6500, and EA6700 devices; and before 1.1.42 build 161129 on EA6900 devices allows remote a...

CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.