Commentary

Content posted in October 2016
In A World With Automation, Where Does Human Intelligence Fit In?
Commentary  |  10/31/2016  | 
For all the talk about robots taking over jobs, there are still important roles for humans in incident response workflows of the not-too-distant future. Here are three.
The 4 Biggest Mistakes Businesses Make Trying To Secure Endpoints
Commentary  |  10/31/2016  | 
Sure, it's tempting to chase whatever collaboration technology is hot at the moment, but this can cause serious data security risks.
Is Your Business Prepared for the SaaS Tsunami?
Commentary  |  10/29/2016  | 
You dont always have to choose between security and productivity when faced with the challenges of Shadow IT.
A Ransomware Tutorial For SMBs
Commentary  |  10/28/2016  | 
Small-to-medium-sized businesses are an easy target for ransomware. Here are four tips that will minimize the risk.
How To Build A Strong Security Awareness Program
Commentary  |  10/27/2016  | 
To become more secure, focus your training and manage your top risks.
20 Endpoint Security Questions You Never Thought to Ask
Commentary  |  10/26/2016  | 
The endpoint detection and response market is exploding! Heres how to make sense of the options, dig deeper, and separate vendor fact from fiction.
Getting To The 'Just Right' Level Of Encryption
Commentary  |  10/26/2016  | 
The key to unlocking secure business messaging is controlling who has the key.
Blockchain & The Battle To Secure Digital Identities
Commentary  |  10/25/2016  | 
This emerging technology is a promising way to verify transactions without compromising your digital identity.
Deleting Emails Original Sin: An Historical Perspective
Commentary  |  10/24/2016  | 
Can DMARC do for email security what SSL certificates did for e-commerce?
A Proactive Approach To Vulnerability Management: 3 Steps
Commentary  |  10/22/2016  | 
Having the tools to detect a breach is important, but what if you could prevent the attack from happening in the first place?
Flipping Security Awareness Training
Commentary  |  10/21/2016  | 
Threats can be minimized when teams understand business goals and objectives. These four tips can help turn things around.
Why Poor Cyber Hygiene Invites Risk
Commentary  |  10/20/2016  | 
Modern cybersecurity today is all about risk management. That means eliminating and mitigating risks where possible, and knowingly accepting those that remain.
Malvertising Trends: Dont Talk Ad Standards Without Ad Security
Commentary  |  10/19/2016  | 
How malvertising marries the strengths and weaknesses of the complex digital advertising ecosystem perfectly and what online publishers and security leaders need to do about it.
A Job In Security Leads To Job Security
Commentary  |  10/18/2016  | 
Developers who focus on secure development skills find themselves in high demand.
Clearing A Path To The Cybersecurity Field
Commentary  |  10/17/2016  | 
Tune in to Dark Reading Radio on Wednesday, Oct. 19 at 1pmET, when we'll discuss what specific efforts in industry, academia, and government, are under way to fill the cybersecurity skills gap.
How To Become A Cybersecurity Entrepreneur In A Crowded Market
Commentary  |  10/17/2016  | 
If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions.
Hacking Voting Systems: A Reality Check
Commentary  |  10/17/2016  | 
Can democracy be hacked? Yes, but not in the way you might think.
Encryption: A Backdoor For One Is A Backdoor For All
Commentary  |  10/14/2016  | 
We need legislation that allows law enforcement to find criminals and terrorists without eroding our security and privacy.
IoT Default Passwords: Just Don't Do It
Commentary  |  10/13/2016  | 
The rise of the Internet of Things makes the use of default passwords especially perilous. There are better options.
Certifying Software: Why Were Not There Yet
Commentary  |  10/12/2016  | 
Finding a solution to the software security and hygiene problem will take more than an Underwriters Lab seal of approval.
Cyber Hunters, Incident Response & The Changing Nature Of Network Defense
Commentary  |  10/11/2016  | 
Or how I learned that network defense needs to evolve from a game of "stumbled upon" to "search and discover."
Database Breaches: An Alarming Lack Of Preparedness
Commentary  |  10/10/2016  | 
It's no secret that databases are fertile ground for malicious activities. Here's how a seven-step process for monitoring known harbingers of an imminent attack can help reduce the risk.
For The Birds: Dark Reading Cartoon Caption Contest Winners
Commentary  |  10/8/2016  | 
Birdwatching-as-a-Service, live tweeting and NESTFLIX. And the winner is ...
Data Science & Security: Overcoming The Communication Challenge
Commentary  |  10/7/2016  | 
Data scientists face a tricky task -- taking raw data and making it meaningful for both security and business teams. Here's how to bridge the gap.
Why Its Always Cyber Hunting Season (& What To Do About It)
Commentary  |  10/6/2016  | 
To stop todays most capable and persistent adversaries, security organizations must rely less on tools and more on human analysis.
20 Questions To Explore With Security-as-a-Service Providers
Commentary  |  10/5/2016  | 
This list will help you leverage the niche expertise of security-as-a-service providers, and assess which vendor can best meet your needs
Privacy Shield's Drama Is Far From Over
Commentary  |  10/4/2016  | 
Businesses are working with trading partners to take responsibility for protecting private data in case the US-EU framework fails.
Grading Obama: C+
Administration Missed Key Opportunities To Civilize Cyberspace
Commentary  |  10/3/2016  | 
A middling grade because the President's cyber policy initiatives were reactive, laisse faire, and didnt buttress American economic opportunity.
Grading Obama: D-
President Failed To Protect Us From The Bad Guys
Commentary  |  10/3/2016  | 
A barely passing grade from a former special agent in charge of the NYC FBI cybercrimes division for failing to create deterrents and policies that encourage self defense.


White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0243
PUBLISHED: 2018-07-19
Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job.
CVE-2014-2302
PUBLISHED: 2018-07-19
The installer script in webEdition CMS before 6.2.7-s1 and 6.3.x before 6.3.8-s1 allows remote attackers to conduct PHP Object Injection attacks by intercepting a request to update.webedition.org.
CVE-2018-7602
PUBLISHED: 2018-07-19
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Rem...
CVE-2018-14332
PUBLISHED: 2018-07-19
An issue was discovered in Clementine Music Player 1.3.1. Clementine.exe is vulnerable to a user mode write access violation due to a NULL pointer dereference in the Init call in the MoodbarPipeline::NewPadCallback function in moodbar/moodbarpipeline.cpp. The vulnerability is triggered when the user...
CVE-2018-1529
PUBLISHED: 2018-07-19
IBM Rational DOORS Next Generation 5.0 through 5.0.2, 6.0 through 6.0.5 and IBM Rational Requirements Composer 5.0 through 5.0.2 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potential...