Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Opinion

posted in October 2016
In A World With Automation, Where Does Human Intelligence Fit In?
Commentary  |  10/31/2016  | 
For all the talk about robots taking over jobs, there are still important roles for humans in incident response workflows of the not-too-distant future. Here are three.
The 4 Biggest Mistakes Businesses Make Trying To Secure Endpoints
Commentary  |  10/31/2016  | 
Sure, it's tempting to chase whatever collaboration technology is hot at the moment, but this can cause serious data security risks.
Is Your Business Prepared for the SaaS Tsunami?
Commentary  |  10/29/2016  | 
You dont always have to choose between security and productivity when faced with the challenges of Shadow IT.
A Ransomware Tutorial For SMBs
Commentary  |  10/28/2016  | 
Small-to-medium-sized businesses are an easy target for ransomware. Here are four tips that will minimize the risk.
How To Build A Strong Security Awareness Program
Commentary  |  10/27/2016  | 
To become more secure, focus your training and manage your top risks.
Warning: Healthcare Data Under Attack
Partner Perspectives  |  10/26/2016  | 
We as an industry must demand greater protection of our medical data.
20 Endpoint Security Questions You Never Thought to Ask
Commentary  |  10/26/2016  | 
The endpoint detection and response market is exploding! Heres how to make sense of the options, dig deeper, and separate vendor fact from fiction.
Lets Clean Up The Internet By Taking Responsibility For Our Actions
Partner Perspectives  |  10/26/2016  | 
Imagine an Internet with multiple levels of security that users need to earn.
Getting To The 'Just Right' Level Of Encryption
Commentary  |  10/26/2016  | 
The key to unlocking secure business messaging is controlling who has the key.
Blockchain & The Battle To Secure Digital Identities
Commentary  |  10/25/2016  | 
This emerging technology is a promising way to verify transactions without compromising your digital identity.
Vendor Security Alliance To Improve Cybersecurity Of Third-Party Providers
Partner Perspectives  |  10/24/2016  | 
Member companies can use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.
Deleting Emails Original Sin: An Historical Perspective
Commentary  |  10/24/2016  | 
Can DMARC do for email security what SSL certificates did for e-commerce?
A Proactive Approach To Vulnerability Management: 3 Steps
Commentary  |  10/22/2016  | 
Having the tools to detect a breach is important, but what if you could prevent the attack from happening in the first place?
Flipping Security Awareness Training
Commentary  |  10/21/2016  | 
Threats can be minimized when teams understand business goals and objectives. These four tips can help turn things around.
Why Arent We Talking More Proactively About Securing Smart Infrastructure?
Partner Perspectives  |  10/20/2016  | 
Lets not perpetuate the vicious cycle of security complexity and failure by trying to bolt on security after the fact.
Why Poor Cyber Hygiene Invites Risk
Commentary  |  10/20/2016  | 
Modern cybersecurity today is all about risk management. That means eliminating and mitigating risks where possible, and knowingly accepting those that remain.
Malvertising Trends: Dont Talk Ad Standards Without Ad Security
Commentary  |  10/19/2016  | 
How malvertising marries the strengths and weaknesses of the complex digital advertising ecosystem perfectly and what online publishers and security leaders need to do about it.
A Job In Security Leads To Job Security
Commentary  |  10/18/2016  | 
Developers who focus on secure development skills find themselves in high demand.
Clearing A Path To The Cybersecurity Field
Commentary  |  10/17/2016  | 
Tune in to Dark Reading Radio on Wednesday, Oct. 19 at 1pmET, when we'll discuss what specific efforts in industry, academia, and government, are under way to fill the cybersecurity skills gap.
How To Become A Cybersecurity Entrepreneur In A Crowded Market
Commentary  |  10/17/2016  | 
If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions.
Hacking Voting Systems: A Reality Check
Commentary  |  10/17/2016  | 
Can democracy be hacked? Yes, but not in the way you might think.
Encryption: A Backdoor For One Is A Backdoor For All
Commentary  |  10/14/2016  | 
We need legislation that allows law enforcement to find criminals and terrorists without eroding our security and privacy.
Access, Trust, And The Rise Of Electronic Personal Assistants
Partner Perspectives  |  10/13/2016  | 
App and device makers are working hard to deliver user control over privacy.
IoT Default Passwords: Just Don't Do It
Commentary  |  10/13/2016  | 
The rise of the Internet of Things makes the use of default passwords especially perilous. There are better options.
Certifying Software: Why Were Not There Yet
Commentary  |  10/12/2016  | 
Finding a solution to the software security and hygiene problem will take more than an Underwriters Lab seal of approval.
Cyber Hunters, Incident Response & The Changing Nature Of Network Defense
Commentary  |  10/11/2016  | 
Or how I learned that network defense needs to evolve from a game of "stumbled upon" to "search and discover."
Database Breaches: An Alarming Lack Of Preparedness
Commentary  |  10/10/2016  | 
It's no secret that databases are fertile ground for malicious activities. Here's how a seven-step process for monitoring known harbingers of an imminent attack can help reduce the risk.
For The Birds: Dark Reading Cartoon Caption Contest Winners
Commentary  |  10/8/2016  | 
Birdwatching-as-a-Service, live tweeting and NESTFLIX. And the winner is ...
Data Science & Security: Overcoming The Communication Challenge
Commentary  |  10/7/2016  | 
Data scientists face a tricky task -- taking raw data and making it meaningful for both security and business teams. Here's how to bridge the gap.
Why Its Always Cyber Hunting Season (& What To Do About It)
Commentary  |  10/6/2016  | 
To stop todays most capable and persistent adversaries, security organizations must rely less on tools and more on human analysis.
Cybersecurity Economics In Government -- Is Funding The Real Problem?
Partner Perspectives  |  10/5/2016  | 
Government leadership and those chartered with creating budgets could benefit from applying sound value-management practices when considering the cybersecurity budget process.
20 Questions To Explore With Security-as-a-Service Providers
Commentary  |  10/5/2016  | 
This list will help you leverage the niche expertise of security-as-a-service providers, and assess which vendor can best meet your needs
Privacy Shield's Drama Is Far From Over
Commentary  |  10/4/2016  | 
Businesses are working with trading partners to take responsibility for protecting private data in case the US-EU framework fails.
Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything?
Partner Perspectives  |  10/4/2016  | 
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency.
Grading Obama: D-
President Failed To Protect Us From The Bad Guys
Commentary  |  10/3/2016  | 
A barely passing grade from a former special agent in charge of the NYC FBI cybercrimes division for failing to create deterrents and policies that encourage self defense.
Grading Obama: C+
Administration Missed Key Opportunities To Civilize Cyberspace
Commentary  |  10/3/2016  | 
A middling grade because the President's cyber policy initiatives were reactive, laisse faire, and didnt buttress American economic opportunity.


Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12524
PUBLISHED: 2020-12-02
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).
CVE-2020-14369
PUBLISHED: 2020-12-02
This release fixes a Cross Site Request Forgery vulnerability was found in Red Hat CloudForms which forces end users to execute unwanted actions on a web application in which the user is currently authenticated. An attacker can make a forgery HTTP request to the server by crafting custom flash file ...
CVE-2020-25638
PUBLISHED: 2020-12-02
A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized informat...
CVE-2020-28272
PUBLISHED: 2020-12-02
Prototype pollution vulnerability in 'keyget' versions 1.0.0 through 2.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28273
PUBLISHED: 2020-12-02
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.