Commentary

Content posted in November 2014
Data Management Vs. Data Loss Prevention: Vive La Diffrence!
Commentary  |  11/25/2014  | 
A sensitive data management strategy can include the use of DLP technology, but it also involves a comprehensive understanding of where your data is and what specifically is at risk.
Cyber Security Needs Its Ralph Nader
Commentary  |  11/24/2014  | 
It took thousands of unnecessary traffic fatalities to create an environment for radical transformation of the auto industry. What will it take for a similar change to occur in data security?
The Week When Attackers Started Winning The War On Trust
Commentary  |  11/21/2014  | 
The misuse of keys and certificates is not exotic or hypothetical. Its a real threat that could undermine most, if not all, critical security controls, as recent headlines strongly show.
Enter The Digital Risk Officer
Commentary  |  11/20/2014  | 
In the brave new world of digital risk management, a CISO would report up to a DRO who manages risk from a business perspective and works with peers in business ops, compliance, and IT security.
Killing Passwords: Dont Get A-Twitter Over Digits
Commentary  |  11/19/2014  | 
Twitters new service that eliminates passwords for authentication actually makes your mobile device less secure.
Deconstructing The Cyber Kill Chain
Commentary  |  11/18/2014  | 
As sexy as it is, the Cyber Kill Chain model can actually be detrimental to network security because it reinforces old-school, perimeter-focused, malware-prevention thinking.
Why Cyber Security Starts At Home
Commentary  |  11/17/2014  | 
Even the grandmas on Facebook need to know and practice basic security hygiene, because what happens anywhere on the Internet can eventually affect us all.
Rethinking Security With A System Of 'Checks & Balances'
Commentary  |  11/14/2014  | 
For too long, enterprises have given power to one branch of security governance -- prevention -- at the expense of the other two: detection and response.
Time To Turn The Tables On Attackers
Commentary  |  11/13/2014  | 
As a security industry, we need to arm business with innovative technologies that provide visibility, analysis, and action to prevent inevitable breaches from causing irreparable damage.
Retail Hacking: What To Expect This Holiday Season
Commentary  |  11/13/2014  | 
Find out what retailers are doing (and not doing) to keep customers and transactions safe on Dark Reading Radio with guests with Nick Pelletier of Mandiant, and Arthur Tisi, CIO, Natural Markets Food Group.
The Enemy Who Is Us: DoD Puts Contractors On Notice For Insider Threats
Commentary  |  11/13/2014  | 
New rule requires US government contractors to gather and report information on insider threat activity on classified networks.
Better Together: Why Cyber Security Vendors Are Teaming Up
Commentary  |  11/12/2014  | 
Alliances, mergers, and acquisitions are ushering in an era of unprecedented co-opetition among former rivals for your point solution business.
Walk & Stalk: A New Twist In Cyberstalking
Commentary  |  11/11/2014  | 
How hackers can turn Wifi signals from smartphones and tablets into a homing beacon that captures users' online credentials and follows them, undetected, throughout the course of the day.
The Staggering Complexity of Application Security
Commentary  |  11/10/2014  | 
During the past few decades of high-speed coding we have automated our businesses so fast that we are now incapable of securing what we have built.
Stop Trusting Signed Malware: 3 Steps
Commentary  |  11/7/2014  | 
Cybercriminals who manipulate valid signatures and certificates to get malware into an organization is a more common tactic than you think.
Once More Into the Breach, Dear CISO
Commentary  |  11/6/2014  | 
The sad truth about CISOs is that they are seldom given power over security budgets or strategic IT decisions. To many C-level execs they exist to accept blame and are given little authority to effect change.
iOS 8 Vs. Android: How Secure Is Your Data?
Commentary  |  11/5/2014  | 
With iOS 8, the lines between iOS and Android are blurring. No longer is iOS the heavily fortified environment and Android the wide-open one.
Workplace Privacy: Big Brother Is Watching
Commentary  |  11/4/2014  | 
Companies may have the right to monitor employees who are checking their bank balances or shopping online on corporate networks. The real question is, should they?
Preparing For A Data Breach: Think Stop, Drop & Roll
Commentary  |  11/3/2014  | 
Breaches are going to happen, which is why we need to treat incident response readiness like fire drills, practicing time and time again until the response is practically instinctive.


6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.