Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Careers & People posted in September 2016
Romanian National Gets Three Years For Hack Scheme
Quick Hits  |  9/30/2016  | 
Mircea-Ilie Ispasoiu was arrested for international hacking plot that involved wire fraud and aggravated identity theft.
Improving Security Savvy Of Execs And Board Room
Improving Security Savvy Of Execs And Board Room
Dark Reading Videos  |  9/28/2016  | 
Jeff Welgan describes how best to improve cybersecurity literacy throughout the C-suite.
Improving The Security Conversation For CIOs, CISOs, & Board Members
News  |  9/28/2016  | 
Cybersecurity is a top priority among enterprise leaders, but it's difficult for them to communicate with IT and security teams if they lack an understanding of key security concepts.
7 Factors That Make Security Organizations More Effective
News  |  9/22/2016  | 
(ISC)2 members have plenty of technical chops, but IANS research found they need to focus more on how infosec aligns with the business.
Snowden: Hollywood Highlights 2 Persistent Privacy Threats
Commentary  |  9/22/2016  | 
Oliver Stones movie shows us that while most of us have nothing to hide, we all have information worth protecting both technically and constitutionally.
Florida Man Charged With Hacking Linux Servers
Quick Hits  |  9/21/2016  | 
Donald Austin allegedly stole credentials of Linux employee to hack four company servers and install rootkit and Trojan software.
 How You Can Support InfoSec Diversity, Starting With The Colleagues You Already Have
How You Can Support InfoSec Diversity, Starting With The Colleagues You Already Have
Dark Reading Videos  |  9/20/2016  | 
Jamesha Fisher, Security Operations Engineer of GitHub, visits the Dark Reading News Desk at Black Hat to discuss her work making security more accessible to the uninitiated, and how a predominately white and male information security field can better support women and people of color.
What Smart Cities Can Teach Enterprises About Security
Commentary  |  9/19/2016  | 
The more you simplify your security program while still being effective, the better, says San Diegos chief information security officer. Heres his three-step process.
The Time Is Now To Address The Cybersecurity Talent Shortage In Unique Ways
Partner Perspectives  |  9/19/2016  | 
Cultivating talent from unaccustomed outlets will benefit all of us.
Top Colleges For Cybersecurity
Slideshows  |  9/19/2016  | 
Check out these respected post-secondary U.S. cybersecurity education programs at both undergraduate and graduate levels.
Stop Blaming Users. Make Security User-Friendly.
Stop Blaming Users. Make Security User-Friendly.
Dark Reading Videos  |  9/15/2016  | 
Jelle Niemantsverdriet of Deloitte explains how security improves if security tools and error messages educate users and 'put a smile on someone's face.'
France's Online Criminal Underground Built On Foundation Of Distrust
News  |  9/14/2016  | 
French criminals seeking black market goods and services -- cyber and otherwise -- have to look in darker shadows and work harder to prove their felonious credibility.
Israeli Teenagers Held For Allegedly Running Hacking Service
Quick Hits  |  9/13/2016  | 
The two 18-year-olds were responsible for more than 150,000 DDoS attacks which earned them around $600,000 in two years, say reports.
Security Certifications Highly Valued But Not Always Verified
News  |  9/13/2016  | 
New study shows IT leaders place the greatest value on cybersecurity certifications, but nearly half rarely confirm legitimacy of new hires' credentials.
Government Accelerates Cyber Hiring
Partner Perspectives  |  9/12/2016  | 
The federal government is looking to add 3,500 more cyber and IT workers by January 2017.
Dan Kaminsky On How Not To Lose The Internet As We Know It
Dan Kaminsky On How Not To Lose The Internet As We Know It
Dark Reading Videos  |  9/12/2016  | 
Dan Kaminsky discusses how to improve the security and privacy of the Internet without destroying the openness and freedom to innovate that it has always provided.
HackProof Systems Challenges Hackers To Breach Server Security
Quick Hits  |  9/8/2016  | 
Company invites hackers to penetrate its new security technology and win $5,000.
Defining The Common Core Of Cybersecurity: Certifications + Practical Experience
Commentary  |  9/7/2016  | 
Security certifications are necessary credentials, but alone wont solve the industrys critical talent gap.
The New Security Mindset: Embrace Analytics To Mitigate Risk
Commentary  |  9/5/2016  | 
Sure, conducting a penetration test can find a weakness. But to truly identify key areas of risk, organizations must start to think more creatively, just like todays hackers.
How IT Departments Can Manage The Security Skills Shortage
News  |  9/1/2016  | 
A lack of skilled cybersecurity talent is putting organizations at risk. Which skills are in highest demand, and how can IT managers secure the right people to protect their information?
How To Talk About Security With Every C-Suite Member
Commentary  |  9/1/2016  | 
Reframe your approach with context in order to get your message across.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-42699
PUBLISHED: 2022-12-06
Auth. Remote Code Execution vulnerability in Easy WP SMTP plugin <= 1.5.1 on WordPress.
CVE-2022-44030
PUBLISHED: 2022-12-06
Redmine 5.x before 5.0.4 allows downloading of file attachments of any Issue or any Wiki page due to insufficient permission checks. Depending on the configuration, this may require login as a registered user.
CVE-2022-41902
PUBLISHED: 2022-12-06
TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have p...
CVE-2022-41910
PUBLISHED: 2022-12-06
TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have p...
CVE-2022-45816
PUBLISHED: 2022-12-06
Auth. Stored Cross-Site Scripting (XSS) vulnerability in GD bbPress Attachments plugin <= 4.3.1 on WordPress.