Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

Most Commented Content posted in February 2017
Talking Cybersecurity From A Risk Management Point of View
Commentary  |  2/3/2017  | 
CenturyLink CSO David Mahon reflects on the evolution of the chief information security officer, and why todays CISOs are increasingly adopting a risk-based approach to security.
Road Map To A $200,000 Cybersecurity Job
Commentary  |  2/23/2017  | 
Looking to get ahead in cybersecurity? Here are four areas to keep in mind as you make a five-year career plan.
4 Signs You, Your Users, Tech Peers & C-Suite All Have 'Security Fatigue'
Commentary  |  2/9/2017  | 
If security fatigue is the disease we've all got, the question is how do we get over it?
Closing The Cybersecurity Skills Gap With STEM
Commentary  |  2/17/2017  | 
As a nation, we should be doing more to promote educational programs that prepare today's students for tomorrow's jobs.
Fight Back Against Ransomware
Commentary  |  2/6/2017  | 
The No More Ransom project helps those affected by ransomware and works to prevent the problem's spread.
Today on Dark Reading: Your Costs, Risks & Metrics Questions Answered
Commentary  |  2/27/2017  | 
First up on the Dark Reading upcoming events calendar is our Dark Reading Virtual Event Tuesday, Feb. 28.
Report: Only 2 in 3 Cyber Attacks Can Be Stopped with Current Defenses
Partner Perspectives  |  2/28/2017  | 
A recent Bitdefender survey of 250 US IT execs in companies with 1000 or more PCs paints a disturbing picture of cybersecurity preparedness in the enterprise.
A New Mantra For Cybersecurity: 'Simulate, Simulate, Simulate!'
Commentary  |  2/1/2017  | 
What security teams can learn from the Apollo 13 space program, a global pandemic, and major infrastructure disruptions to identify their best responses to attacks.
The Interconnected Nature Of International Cybercrime
Commentary  |  2/1/2017  | 
How burgeoning hackers are honing their craft across language barriers from top tier cybercriminal ecosystems and forums of the Deep and Dark Web.
Enterprise Android Vs iOS: Which is More Secure?
Commentary  |  2/7/2017  | 
The answer is not as simple as you think. A mobile security expert parses the pros and cons.
You Can't Hire Your Way Out Of A Skills Shortage ... Yet
Commentary  |  2/13/2017  | 
It will take much effort to fix the IT and cybersecurity talent crisis, but it is possible.
Why Identity Has Become A Top Concern For CSOs
Commentary  |  2/14/2017  | 
Seven of the world's top security leaders share their fears and challenges around the critical new role of identity in the fight against cyber adversaries.
Preparing Security For Windows 7 End-Of-Life Support
Commentary  |  2/21/2017  | 
Moving to Microsoft's latest OS may give you flashbacks to when XP support ended.
In Cybersecurity, Language Is a Source of Misunderstandings
Commentary  |  2/27/2017  | 
To successfully fight threats across industries, we must all use the same terminology.
Blockchains New Role In The Internet of Things
Commentary  |  2/23/2017  | 
With next gen distributed consensus algorithms that combine both security and performance, organizations can defend against DDoS attacks, even those that leverage IoT devices
Why We Need To Reinvent How We Catalogue Malware
Commentary  |  2/22/2017  | 
One obvious trend: crimeware technologies that come with simple user consoles and functionality to create unique binaries at the click of a button.
Tunneling Through The "Walls" Of IoT In The Enterprise
Commentary  |  2/22/2017  | 
The movie "Die Hard" has a thing or two to teach us about the pitfalls of the Internet of Things.
Controlling Privileged Access To Prevent Rogue Users In Active Directory
Commentary  |  2/20/2017  | 
Knowing which of your employees have which privileges is the first step to staying safe.
Keep Employees Secure, Wherever They Are
Commentary  |  2/10/2017  | 
As workers grow more dispersed, organizations need to focus on three areas to maintain security.
Mac Malware Reaches New Highs
Partner Perspectives  |  2/28/2017  | 
Two new malware threats in a week this past month, plus others in January, brings the 2017 Mac malware count up to 6 and growing.
How Security Pros Can Bridge The Skills Shortage
Commentary  |  2/28/2017  | 
By paying it forward, we can help address the industrys exploding need for talent.


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20001
PUBLISHED: 2020-08-04
An issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.
CVE-2020-15467
PUBLISHED: 2020-08-04
The administrative interface of Cohesive Networks vns3:vpn appliances before version 4.11.1 is vulnerable to authenticated remote code execution leading to server compromise.
CVE-2020-5615
PUBLISHED: 2020-08-04
Cross-site request forgery (CSRF) vulnerability in [Calendar01] free edition ver1.0.0 and [Calendar02] free edition ver1.0.0 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2020-5616
PUBLISHED: 2020-08-04
[Calendar01], [Calendar02], [PKOBO-News01], [PKOBO-vote01], [Telop01], [Gallery01], [CalendarForm01], and [Link01] [Calendar01] free edition ver1.0.0, [Calendar02] free edition ver1.0.0, [PKOBO-News01] free edition ver1.0.3 and earlier, [PKOBO-vote01] free edition ver1.0.1 and earlier, [Telop01] fre...
CVE-2020-5617
PUBLISHED: 2020-08-04
Privilege escalation vulnerability in SKYSEA Client View Ver.12.200.12n to 15.210.05f allows an attacker to obtain unauthorized privileges and modify/obtain sensitive information or perform unintended operations via unspecified vectors.