News & Commentary

Content tagged with Compliance posted in February 2011
Report: Social Networks Are The New Platform For Communications -- And Malware
Quick Hits  |  2/23/2011  | 
Email, IM fall lower on the list; malware authors take note and respond accordingly, Blue Coat says
Busting DLP Myths
News  |  2/17/2011  | 
Misinformation has stopped many organizations that could have been helped by the technology from moving forward with implementations
Microsoft Exec Talks Up Healthcare For User Machines
Quick Hits  |  2/16/2011  | 
'Collective defense' approach could use certificates of machine health, but some experts say it won't solve the problem
New 'Boy In The Browser' Attacks On The Rise
News  |  2/14/2011  | 
Researchers at Imperva identify proxy Trojan attack targeting banks, retailers, and Google that's a less-sophisticated knock-off of 'man-in-the-browser'
Google Introduces Two-Factor Authentication Option
Quick Hits  |  2/11/2011  | 
Users can now generate a second, one-time password for Gmail and other accounts using a mobile phone
Forty Percent Of Users Curse PCs, But Only 3 Percent Smash Them
Quick Hits  |  2/7/2011  | 
Most users have at least wished for bad things to happen to their machines, Avira study says
Product Watch: AppRiver's SecureSurf Simplifies Malware Protection And Web Filtering
News  |  2/4/2011  | 
New service offers combination of DNS and proxy technology for Web filtering
Verisign Selected To Operate .gov Domain Name Registry
News  |  2/3/2011  | 
Company also will support the implementation of DNS Security Extensions


WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I'm not sure I like this top down management approach!"
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17321
PUBLISHED: 2018-09-22
An issue was discovered in SeaCMS 6.64. XSS exists in admin_datarelate.php via the time or maxHit parameter in a dorandomset action.
CVE-2018-17322
PUBLISHED: 2018-09-22
Cross-site scripting (XSS) vulnerability in index.php/index/category/index in YUNUCMS 1.1.4 allows remote attackers to inject arbitrary web script or HTML via the area parameter.
CVE-2018-14889
PUBLISHED: 2018-09-21
CouchDB in Vectra Networks Cognito Brain and Sensor before 4.3 contains a local code execution vulnerability.
CVE-2018-14890
PUBLISHED: 2018-09-21
Vectra Networks Cognito Brain and Sensor before 4.2 contains a cross-site scripting (XSS) vulnerability in the Web Management Console.
CVE-2018-14891
PUBLISHED: 2018-09-21
Management Console in Vectra Networks Cognito Brain and Sensor before 4.3 contains a local privilege escalation vulnerability.