News & Commentary

Latest Content tagged with Compliance
<<   <   Page 2 / 2
You Have One Year to Make GDPR Your Biggest Security Victory Ever
News  |  5/25/2017
The EU's new razor-toothed data privacy law could either rip you apart or help you create the best security program you've ever had. Here's how.
Data Security & Privacy: The Risks of Not Playing by the Rules
Commentary  |  5/24/2017
Achieving compliance is a complex and challenging process. But with the right systems and policies, you can stay ahead of the next data breach and the regulators.
The Wide-Ranging Impact of New York's Cybersecurity Regulations
Commentary  |  5/16/2017
New York's toughest regulations yet are now in effect. Here's what that means for your company.
Users Overshare Sensitive Enterprise Data
News  |  4/20/2017
Survey finds nearly half of the employees trained to protect sensitive data engage in risky security practices.
Microsoft: Foreign Surveillance Requests Under FISA Shot Up in 2016
Quick Hits  |  4/14/2017
The company received 1,000-1,499 surveillance requests from January0- toJune 2016, the highest since 2011.
Health Savings Account Fraud: The Rapidly Growing Threat
Commentary  |  4/14/2017
As income tax season comes to a close, financially-motivated cybercriminals are honing new tactics for monetizing medical PII.
Cybersecurity & Fitness: Weekend Warriors Need Not Apply
Commentary  |  4/12/2017
It takes consistency and a repeatable but flexible approach to achieve sustainable, measurable gains in both disciplines.
The New Shadow IT: Custom Data Center Applications
Commentary  |  4/7/2017
If you think youve finally gotten control of unsanctioned user apps, think again. The next wave of rogue apps is on its way from your data center to the cloud.
11 UK Charities Punished for Violating Data Privacy Law
Quick Hits  |  4/6/2017
Organizations fined between 6,000 and 18,000 by UKs Information Commissioners Office.
GDPR Doesnt Need to be GDP-Argh!
Commentary  |  4/5/2017
These 10 steps will ease the pain of compliance with the General Data Protection Regulation, the EU's new privacy law that goes into effect in a little over a year.
As Cloud Use Expands, So Do Security Blind Spots, Studies Show
News  |  4/4/2017
Three-quarters of IaaS and SaaS apps arent monitored.
Privacy Babel: Making Sense of Global Privacy Regulations
Commentary  |  3/29/2017
Countries around the world are making their own privacy laws. How can a global company possibly keep up?
Cloud Security: New Research Says IT Pros Still Skittish
News  |  3/29/2017
Respondents complain in two studies that traditional security tools dont work in the cloud, and cant deliver visibility across multiple cloud environments.
In Cyber, Who Do We Trust to Protect the Business?
Commentary  |  3/16/2017
If business leaders and directors continue to view cybersecurity as mainly a matter for the IT department, they will leave their companies exposed to significant risks.
FBI Chief Calls for United Fight Against Cybercrime
Quick Hits  |  3/10/2017
James Comey stresses the need to address encryption challenges faced by law enforcement.
New Yorks Cyber Regulations: How to Take Action & Whos Next
Commentary  |  3/6/2017
Even if your company isnt directly subject to these new rules, you can assume that the approach will be adopted by regulatory agencies at home and abroad eventually.
US Lawmakers Seek Grant For State, Local Cybersecurity
Quick Hits  |  3/6/2017
State Cyber Resiliency Act aims to increase resources for governments so they can fight cyber threats.
Yahoo CEO Punished for Data Breaches
Quick Hits  |  3/3/2017
Marissa Mayer will be denied her annual bonus of around $2 million and also forgoes annual stock award worth millions.
New Cybersecurity Regulations Begin Today For NY Banks
News  |  3/1/2017
New York's new security regulations for financial industry viewed as potential model for other states.
Cyber Insurance Uptake Hampered By Skewed Data, Poor Communication
News  |  2/25/2017
Only 29% of US businesses have cyber insurance; Deloitte outlines steps for insurance companies to improve risk models, communication, and policy sales.
After Election Interference, RSA Conference Speakers Ask What Comes Next
News  |  2/17/2017
Election-tampering called 'a red line we should not allow anyone to cross.'
Microsoft President Says Tech Industry Should Be 'Neutral Digital Switzerland'
Quick Hits  |  2/14/2017
RSA Conference: Brad Smith also says the world needs a "Digital Geneva Convention" to establish the international rules for nation-state cyber conflict.
National Security, Regulation, Identity Top Themes At Cloud Security Summit
News  |  2/13/2017
Gen. Keith Alexander gives Trump a thumbs-up and Cloud Security Alliance releases a new application.
Talking Cybersecurity From A Risk Management Point of View
Commentary  |  2/3/2017
CenturyLink CSO David Mahon reflects on the evolution of the chief information security officer, and why todays CISOs are increasingly adopting a risk-based approach to security.
This Week On Dark Reading
Commentary  |  1/30/2017
This week: how to get paid by cyber insurers and avoid paying ransoms.
Why Youre Doing Cybersecurity Risk Measurement Wrong
Commentary  |  1/30/2017
Measuring risk isnt as simple as some make it out to be, but there are best practices to help you embrace the complexity in a productive way. Here are five.
US Seeks To Intervene In Case Against Privacy Shield
Quick Hits  |  1/20/2017
Digital Rights Ireland has challenged the data transfer pact raising questions of its ability to protect EU privacy.
Credit Freeze: The New Normal In Data Breach Protection?
Commentary  |  1/11/2017
In era of rampant identity theft, consumers should be offered the protection of a credit freeze by default, instead of a nuisance fee each time a freeze is placed or removed.
FTC Charges D-Link With Unsecure Routers And IP Cameras
Quick Hits  |  1/6/2017
Federal Trade Commission voices concerns in US district court that D-Link products had put consumers' privacy at risk.
44% Of Companies Miss Breach Reporting Deadlines
Quick Hits  |  12/20/2016
Balabit research on security investigation says organizations lack of understanding lead to delay in breach probe.
Ashley Madison To Pay $17.5 Million In Breach Settlement
Quick Hits  |  12/15/2016
Ashley Madison was found guilty of lax data security and also corrupt practices including photo and profile misuse.
Why Video Game Publishers Must Adopt Enforceable Security Standards
Commentary  |  12/9/2016
Video games have been under attack at an unprecedented rate since 2012, with cyber criminals playing an increasingly significant role.
How Retailers Can Fight Holiday Season Hackers
Slideshows  |  12/8/2016
Experts offer tips for locking down retailers point-of-sale systems for the busy holiday shopping season.
Petition Forces Parliament To Reconsider Surveillance Bill
Quick Hits  |  11/28/2016
100,000 signatures require MPs to consider debating Snoopers' Charter again.
178 Arrested In Money Mule Crackdown
Quick Hits  |  11/22/2016
Total of 17 countries involved in second European effort to disrupt cybercriminals' money laundering mechanism.
Adobe To Pay $1 Million Compensation In Data Breach Case
Quick Hits  |  11/17/2016
Personal data of more than 500,000 consumers from 15 states were stolen in the 2013 breach of Adobe server.
Security Experts Call For Regulation On IoT Cybersecurity
News  |  11/16/2016
During a House Committee hearing today, Bruce Schneier also asks for the establishment of a new government agency devoted to cybersecurity.
75,000 Data Protection Officers Needed By 2018 To Handle EU Law
News  |  11/9/2016
US alone will need 9,000 DPOs to meet GDPR mandates, says International Association of Privacy Professionals - but don't expect that many new job listings.
China Passes Controversial Cybersecurity Law
Quick Hits  |  11/8/2016
Global business and rights groups raise concern about the censorship that could impact foreign business interests.
Election 2016 & WikiLeaks: Bad, But Not Your Worst Nightmare
Commentary  |  11/4/2016
John Podesta may be the poster child for poor user security practices but the real problem is rigid regulatory compliance frameworks that perpetuate ineffective perimeter defenses.
Anthem Breach Victims Go To Court Over Cybersecurity Audit Release
Quick Hits  |  11/1/2016
Class-action lawsuit against health insurer seeks disclosure of network security details following data breach of 80 million members.
US Should Help Private Sector 'Active Defense,' But Outlaw Hacking Back, Says Task Force
News  |  10/31/2016
Task Force at George Washington University suggests ways for government to clear up legal quagmires, improve tools, keep us all out of trouble.
Preparing For Government Data Requests After Apple Vs. FBI
Preparing For Government Data Requests After Apple Vs. FBI
Dark Reading Videos  |  10/31/2016
Jennifer Granick and Riana Pfefferkorn discuss lessons learned from the Apple-FBI case, and how security pros should be prepared if government data requests hit closer to home.
Yahoo Demands Government Be More Transparent About Data Requests
Quick Hits  |  10/20/2016
In a letter to the Director of National Intelligence, the tech company says this transparency would also help clear Yahoo's name in customer email scan case.
US Bank Regulators Draft Rules For Financial Services Cybersecurity
Quick Hits  |  10/20/2016
Proposed standards will require financial firms to recover from any cyberattack within two hours.
California Victims Of Yahoo Breach Pursue Claims In State, Not Federal Court
News  |  10/17/2016
Plaintiffs hope to benefit from California's history of stricter cybersecurity and data privacy law.
G7 Nations Plan To Team Up To Tackle Financial Cybercrime
Quick Hits  |  10/12/2016
Group of Seven nations new guidelines include sharing updates by governments, private firms and regulators, plus joint address of shortfalls.
20 Questions To Explore With Security-as-a-Service Providers
Commentary  |  10/5/2016
This list will help you leverage the niche expertise of security-as-a-service providers, and assess which vendor can best meet your needs
Grading Obama: D-
President Failed To Protect Us From The Bad Guys
Commentary  |  10/3/2016
A barely passing grade from a former special agent in charge of the NYC FBI cybercrimes division for failing to create deterrents and policies that encourage self defense.
Grading Obama: C+
Administration Missed Key Opportunities To Civilize Cyberspace
Commentary  |  10/3/2016
A middling grade because the President's cyber policy initiatives were reactive, laisse faire, and didnt buttress American economic opportunity.
<<   <   Page 2 / 2

Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.