News & Commentary

Content tagged with Compliance posted in June 2012
Not Much To Learn From The Second Kick Of The Mule
Commentary  |  6/29/2012  | 
Repeating compliance and security failures shows a lack of progress
Startup Wraps User Tasks In Virtual Containers
News  |  6/20/2012  | 
Bromium announces micro-VM technology that protects the OS, network, from users' security missteps
The Compliance Officer's Dirty Little Secret
News  |  6/18/2012  | 
Fines may not equal cost of regulatory compliance, but they aren't the only cost of noncompliance
Ironman And Captain America Fight Over Compliance
Commentary  |  6/18/2012  | 
Defending your company requires both warriors and soldiers
Security Startups Focusing On Threats, Not Malware
News  |  6/14/2012  | 
Stopping malware is so yesterday. Eclectic groups of security people have banded together to make life difficult for attackers
IT Pros Say Privileged Accounts Getting '0wned'
Quick Hits  |  6/12/2012  | 
Businesses see insiders as the No. 1 threat, new survey says
Keep Watch On Accounts For Stolen Passwords
News  |  6/8/2012  | 
Log management and a well-refined ruleset can help companies pinpoint suspicious activity on accounts that suggest a password compromise
The Truth Is Not Believable
Commentary  |  6/7/2012  | 
Too many businesses don’t want to know about their compliance problems
When Antivirus Fails, All Is Not Lost
News  |  6/5/2012  | 
Following Flame, Stuxnet, and Duqu, even the antivirus industry is questioning its ability to stop targeted attacks. Yet other technologies exist to catch malware in the corporate network
5 Ways You're Wasting Compliance Dollars
News  |  6/4/2012  | 
Fighting redundancy and ineffectual practices leaves more money for meaningful security
Systems Are Not Compliant; Organizations Are Compliant
Commentary  |  6/1/2012  | 
IT cannot make your organization compliant


WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17317
PUBLISHED: 2018-09-21
FruityWifi (aka PatatasFritas/PatataWifi) 2.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the io_mode, ap_mode, io_action, io_in_iface, io_in_set, io_in_ip, io_in_mask, io_in_gw, io_out_iface, io_out_set, io_out_mask, io_out_gw, iface, or domain parameter to /ww...
CVE-2018-17320
PUBLISHED: 2018-09-21
An issue was discovered in UCMS 1.4.6. aaddpost.php has stored XSS via the sadmin/aindex.php minfo parameter in a sadmin_aaddpost action.
CVE-2018-17141
PUBLISHED: 2018-09-21
HylaFAX 6.0.6 and HylaFAX+ 5.6.0 allow remote attackers to execute arbitrary code via a dial-in session that provides a FAX page with the JPEG bit enabled, which is mishandled in FaxModem::writeECMData() in the faxd/CopyQuality.c++ file.
CVE-2018-17173
PUBLISHED: 2018-09-21
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
CVE-2018-17174
PUBLISHED: 2018-09-21
A stack-based buffer overflow was discovered in the xtimor NMEA library (aka nmealib) 0.5.3. nmea_parse() in parser.c allows an attacker to trigger denial of service (even arbitrary code execution in a certain context) in a product using this library via malformed data.