Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

A New Look For Dark Reading

New site layout, functionality will make it easier for Dark Reading's IT security readers to find the information they need

You know it's there. That one piece of information you need to do your job as a security professional. You've been poring over the screen for minutes, even hours, yet you still can't find it -- it's cleverly concealed, right there in plain sight.

Is this a new type of hack? No, I'm talking about the old design of your favorite IT security news site, Dark Reading. Heck, this site had become so difficult to navigate that even I got lost sometimes -- and I'm its editor.

Today, after almost seven years of delivering some of the best and most incisive cybersecurity news and information on the Web, Dark Reading now has a new look to match. We've streamlined the design, improved the navigation, and added a few features that we hope will make our news site more valuable to you, our loyal readers.

The first thing you'll notice is that the red navigation bar at the top of the home page has been improved and consolidated. Click on any one of those tabs -- Advanced Threats, Cloud Security, Risk Management, etc. -- and you'll be brought to one of our Tech Centers, which are subsites packed with breaking news, commentary, special reports, and data links to help you find the specific IT security information you need to do your job. Each of our Tech Centers provides a level of depth that you won't find elsewhere on the Web.

The next thing you'll see is a news "carousel" leading off the page, providing a rotating display of our latest features, including our hottest news stories, short "Quick Hit" articles, and vendor product news. You can control that display with a click of your mouse, grabbing any story you like or stopping the rotation of the displayed articles so that you see only the one feature you want.

Underneath the carousel, you'll find the same News Analysis section you have read for years; click on any story you like, or click on the "News" tab at the top of the page, for a full display of all of our recent news stories. Click on "Quick Hits" (you might remember it as the Keyhole section on the old Dark Reading site), and you'll get a look at some shorter, quicker stories that may help you keep up to date with the latest breach news and security research.

But, wait, there's more. Dark Reading's old "Blogs" section has been reworked and moved into the new "Commentary" section, which includes this daily blog, "Today from Dark Reading." This will make it easier than ever for you to find opinions and expert advice from some of the IT security industry's best-known and most respected personalities.

Want to locate additional useful content? We've updated our Events, Products & Releases (formerly Newsfeed), and Best of the Web sections to offer more accurate and current information than ever before. Each Dark Reading story now contains links to related material from our news archives. And the home page contains links to reports, white papers, Dark Reading digital issues, expert-written Tech Insight columns -- and even a Bugs report that is streamed directly from US-CERT's National Vulnerability Database.

Still looking? Try our simple "Search" box at the top right of the home page. If it's a topic that Dark Reading has written about in the past, then you'll get a list of all our stories, with the most recent items at the top. Try looking up the word "firewall" -- you'll find dozens of current articles, commentaries, and product announcements, as well as a historical archive that shows the recent evolution of the technology. Try it next time you're writing an RFP for a new product. We think you'll find it useful.

There's so much more to look at and click on -- a single archive for Tech Insight, our regular feature written exclusively by security pros; full archives of slide shows and online video; a comment box showing some of the latest input from readers; and more. Click around -- you'll find some new areas on the site, as well as some well-established areas that you may never have noticed before.

You spend enough time digging through screens of data as you do your day job. Navigating your daily security news site should be a lot easier. With this new look, we believe that we've found a way to give you more information than ever before -- while making it easier and faster for you to find what you're looking for.

We hope you'll like the new-look Dark Reading. And if you don't -- or if you find links that aren't working or don't work the way you'd like -- let us know. In the end, this is your news site. We'd love to hear any feedback you'd like to offer. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
awittmann941
50%
50%
awittmann941,
User Rank: Apprentice
4/22/2013 | 5:10:02 PM
re: A New Look For Dark Reading
It's brilliant, Tim. Just brilliant.
Ciph3r
50%
50%
Ciph3r,
User Rank: Apprentice
4/21/2013 | 4:36:07 PM
re: A New Look For Dark Reading
Love the new site. Great job!
kjhiggins
50%
50%
kjhiggins,
User Rank: Strategist
4/18/2013 | 4:44:00 PM
re: A New Look For Dark Reading
That was a temporary glitch, dritchie. We are back now. Thanks for your patience.
dritchie
50%
50%
dritchie,
User Rank: Strategist
4/18/2013 | 4:25:09 PM
re: A New Look For Dark Reading
What is with the Grey background color?- Makes it impossible to read.
Kenjichan
50%
50%
Kenjichan,
User Rank: Apprentice
4/18/2013 | 6:44:12 AM
re: A New Look For Dark Reading
Great looks for a great site! Welcome to Web 2.0!
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18986
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 allow attackers to brute-force (guess) valid usernames by using the 'forgot password' functionality as it returns distinct messages for invalid password and non-existing users.
CVE-2019-18981
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 lacks an Access Denied outcome for a certain scenario of an incorrect recipient ID of a notification.
CVE-2019-18982
PUBLISHED: 2019-11-15
bundles/AdminBundle/Controller/Admin/EmailController.php in Pimcore before 6.3.0 allows script execution in the Email Log preview window because of the lack of a Content-Security-Policy header.
CVE-2019-18985
PUBLISHED: 2019-11-15
Pimcore before 6.2.2 lacks brute force protection for the 2FA token.
CVE-2019-18928
PUBLISHED: 2019-11-15
Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.