Application Security
News & Commentary
Recovering from Bad Decisions in the Cloud
Jeff Schilling, Chief Security Officer, ArmorCommentary
The cloud makes it much easier to make changes to security controls than in traditional networks.
By Jeff Schilling Chief Security Officer, Armor, 6/26/2017
Comment1 Comment  |  Read  |  Post a Comment
The Folly of Vulnerability & Patch Management for ICS Networks
Galina Antova & Patrick McBride, Co-founder & Chief Marketing Officer, ClarotyCommentary
Yes, such efforts matter. But depending on them can give a false sense of security.
By Galina Antova & Patrick McBride Co-founder & Chief Marketing Officer, Claroty, 6/21/2017
Comment1 Comment  |  Read  |  Post a Comment
Feds Call on Contractors to Play Ball in Mitigating Insider Threats
Thomas Jones, Federal Systems Engineer at Bay DynamicsCommentary
It's said that you're only as strong as your weakest player. That's as true in security as it is in sports.
By Thomas Jones Federal Systems Engineer at Bay Dynamics, 6/20/2017
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Fact vs. Fiction
Marc Laliberte, Information Security Threat Analyst, WatchGuard TechnologiesCommentary
Based on popular media, it's easy to be concerned about the security of smart cars, homes, medical devices, and public utilities. But how truly likely are such attacks?
By Marc Laliberte Information Security Threat Analyst, WatchGuard Technologies, 6/20/2017
Comment2 comments  |  Read  |  Post a Comment
Invisible Invaders: Why Detecting Bot Attacks Is Becoming More Difficult
Ido Safruti,  Founder and CTO at PerimeterXCommentary
Traditional methods can't block the latest attackers, but a behavioral approach can tell the difference between bots and humans.
By Ido Safruti Founder and CTO at PerimeterX, 6/19/2017
Comment0 comments  |  Read  |  Post a Comment
Forrester: Rapid Cloud Adoption Drives Demand for Security Tools
Kelly Sheridan, Associate Editor, Dark ReadingNews
Cloud services revenue is poised to skyrocket from $114 billion in 2016 to $236 billion by 2020, driving the market for products to secure data in the cloud.
By Kelly Sheridan Associate Editor, Dark Reading, 6/16/2017
Comment0 comments  |  Read  |  Post a Comment
Why Your AppSec Program Is Doomed to Fail & How to Save It
Rohit Sethi, COO of Security CompassCommentary
With these measures in place, organizations can avoid common pitfalls.
By Rohit Sethi COO of Security Compass, 6/16/2017
Comment0 comments  |  Read  |  Post a Comment
Climbing the Security Maturity Ladder in Cloud
Daniel Mellen, Accenture Managing Director, SecurityCommentary
These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads.
By Daniel Mellen Accenture Managing Director, Security, 6/15/2017
Comment0 comments  |  Read  |  Post a Comment
Survey: 58% of Security and Development Teams Play Nice
Dark Reading Staff, Quick Hits
Despite frequent talk of tension between software development and security teams, it turns out more than half of organizations surveyed have these two groups collaborating.
By Dark Reading Staff , 6/14/2017
Comment0 comments  |  Read  |  Post a Comment
How Smart Cities Can Minimize the Threat of Cyberattacks
Todd Thibodeaux, President & CEO, CompTIACommentary
As cities face the digital future, governments must prioritize cybersecurity protocols to mitigate attacks that could cripple entire communities.
By Todd Thibodeaux President & CEO, CompTIA, 6/14/2017
Comment0 comments  |  Read  |  Post a Comment
Relentless Attackers Try Over 100,000 Times Before They Breach a System
Ericka Chickowski, Contributing Writer, Dark ReadingNews
New report from startup tCell shows XSS attempts a noisy reminder of the overwhelming scale of automated attack techniques.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/14/2017
Comment0 comments  |  Read  |  Post a Comment
The Detection Trap: Improving Cybersecurity by Learning from the Secret Service
Nathaniel Gleicher, Head of Cybersecurity Strategy, IllumioCommentary
Intruders often understand the networks they target better than their defenders do.
By Nathaniel Gleicher Head of Cybersecurity Strategy, Illumio, 6/12/2017
Comment2 comments  |  Read  |  Post a Comment
Your Information Isn't Being Hacked, It's Being Neglected
Mike Baukes, Co-Founder & Co-CEO, UpGuardCommentary
To stop customer information from being compromised, we must shore up the most vulnerable parts first, the day-to-day IT operations work that builds, configures, and changes systems.
By Mike Baukes Co-Founder & Co-CEO, UpGuard, 6/9/2017
Comment1 Comment  |  Read  |  Post a Comment
The Economics of Software Security: What Car Makers Can Teach Enterprises
Jim Routh, Chief Security Officer, AetnaCommentary
Embedding security controls early in the application development process will go a long way towards driving down the total cost of software ownership.
By Jim Routh Chief Security Officer, Aetna, 6/8/2017
Comment0 comments  |  Read  |  Post a Comment
Security in the Cloud: Pitfalls and Potential of CASB Systems
Kelly Sheridan, Associate Editor, Dark ReadingNews
The transition to cloud has driven a demand for CASB systems, but today's systems lack the full breadth of functionality businesses need.
By Kelly Sheridan Associate Editor, Dark Reading, 6/7/2017
Comment2 comments  |  Read  |  Post a Comment
Cybersecurity Stands as Big Sticking Point in Software M&A
Ericka Chickowski, Contributing Writer, Dark ReadingNews
The breach that was the fly in the ointment of the Yahoo-Verizon deal is one of many now surfacing as security of acquired firms starts to become a point of negotiation.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/7/2017
Comment0 comments  |  Read  |  Post a Comment
Balancing the Risks of the Internet of Things
Darren Anstee, Chief Technology Officer at Arbor NetworksCommentary
Do the benefits of an Internet-connected coffee maker really outweigh its security issues?
By Darren Anstee Chief Technology Officer at Arbor Networks, 6/7/2017
Comment0 comments  |  Read  |  Post a Comment
Slack, Telegram, Other Chat Apps Being Used as Malware Control Channels
Kelly Sheridan, Associate Editor, Dark ReadingNews
Cybercriminal are abusing third-party chat apps as command-and-control infrastructures to spread their malware.
By Kelly Sheridan Associate Editor, Dark Reading, 6/6/2017
Comment1 Comment  |  Read  |  Post a Comment
How to Succeed at Incident Response Metrics
Tom Webb, Incident Handler, SANS Internet Storm CenterCommentary
Establishing a baseline of what information you need is an essential first step.
By Tom Webb Incident Handler, SANS Internet Storm Center, 6/2/2017
Comment1 Comment  |  Read  |  Post a Comment
Security & Development: Better Together
Brent Midwood, Director of Product Management, AttackIQCommentary
How DevSecOps removes the silos between security and application development teams so that everyone can work together at the same speed.
By Brent Midwood Director of Product Management, AttackIQ, 6/1/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.