Content posted in January 2016
Cloud Security: Its Become A People Problem
Commentary  |  1/29/2016
Now that the cloud is becoming secure enough for sensitive data, are cloud customers ready to hold up their end of a shared liability model?
Data Privacy: Key Elements Of An Information Governance Plan
Commentary  |  1/28/2016
For Data Privacy Day! Do you have the policies in place to safeguard your companys most strategic information? Here are nine best practices.
Careers in InfoSec: Dont Be Fooled By The Credential Alphabet
Commentary  |  1/27/2016
Analytical skills, work ethic, an ability to overcome obstacles, and a natural drive to solve problems are the critical hiring factors in todays tight job market.
NetFlow Or sFlow For Fastest DDoS Detection?
Commentary  |  1/26/2016
It's still not an easy choice, but combined with the faster NetFlow exporters that have recently come to market, the speed advantage of sFlow is starting to fade.
How (And Why) Hackers Target Your Business
Commentary  |  1/25/2016
Dont miss this inside look by a trio of experts from industry and law enforcement during Dark Reading's virtual event, Cybersecurity: The Business View. Now available On-Demand.
Measuring Real Risk: The Business View
Commentary  |  1/22/2016
Dark Reading's Jan. 26 virtual event on the business perspective of cybersecurity will feature a panel discussion on how to measure risk and the cost of a security program.
The Apple App Store Incident: Trouble in Paradise?
Commentary  |  1/22/2016
The fact that Apples security model has worked so well in the past doesnt mean it will work well forever. Heres why.
When The Boss Is Your Biggest Security Risk
Commentary  |  1/21/2016
No one possesses more sensitive information in an organization than upper management. So why do companies screen executives on the way in but not on the way out?
Preparing Your Business For A Major Data Breach: The Business View
Commentary  |  1/20/2016
Today's Dark Reading's Virtual Conference on the business perspectives of cybersecurity will include a panel to prep your leaders for responding to the inevitable breach.
Behavioral Analytics: The Future of Just-in-Time Awareness Training?
Commentary  |  1/20/2016
Its high time we leveraged modern threat detection tools to keep users on the straight and narrow road of information security.
Cloud Security: To Scale Safely, Think Small
Commentary  |  1/19/2016
Why today's enterprises need an adaptable cloud infrastructure centered around flexibility, portability, and speed.
Dark Reading Radio: A New Job Description For the CISO
Commentary  |  1/19/2016
As cyberattacks grow and evolve, so too has the role of the chief information security officer. Fascinating discussion on key trends and challenges.
IoT Security: $1-per-Thing To Protect Connected Devices
Commentary  |  1/14/2016
Locking down the Internet of Things wont be cheap. Here's the math.
We Are What We Eat: Software Assurance Edition
Commentary  |  1/13/2016
The fact that open-source code you use is free from vulnerabilities today doesnt mean that it will remain that way in the near future.
A DDoS Learning Curve for Universities, Government & Enterprises
Commentary  |  1/12/2016
Distributed Denial of Service attacks are easy, cheap and too often, effective. But theyre not unstoppable.
7 Criteria For Enriching Digital Evidence
Commentary  |  1/11/2016
Context is the essential ingredient that is missing from many digital forensic investigations.
Lessons Learned About Critical Infrastructure: Whats Good Enough?
Commentary  |  1/8/2016
Over the past decade, oil and gas companies have invested significant resources in security management, but there are sizable challenges ahead in people and processes.
The Matrix Reloaded: Security Goals v. Operational Requirements
Commentary  |  1/7/2016
Building a matrix that measures people, process, and technology against security goals is a proven method for reducing risk in an organization. Heres how.
Data Insecurity: Flawed Technology Or Outdated Business Process?
Commentary  |  1/6/2016
When it comes to protecting critical data, legacy processes are just as vulnerable as legacy software.
How Technologies Incubated A Decade Ago Shape The World Today
Commentary  |  1/5/2016
The security industry is doing a better job of sharing threat intelligence than ever before, but we're also sharing with the enemy.
2015: The Year Of 'Attacks on Trust'
Commentary  |  1/4/2016
Nine attacks that leveraged stolen, compromised, or unprotected cryptographic keys and digital certificates show how easy it is for cybercriminals to bypass security controls and hide their actions.

Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
(ISC)2 Report: Glaring Disparity in Diversity for US Cybersecurity
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/15/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.