Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Commentary

Content posted in September 2013
Pen Testing: Making Passion A Priority
Commentary  |  9/30/2013  | 
What sets real penetration testers apart is their motivation and willingness to lose themselves in something they love
Commerce In A World Without Trust
Commentary  |  9/29/2013  | 
The trust model underlying online commerce has been threatened by the constant attacks on information providers used to authenticate consumers. Is the Internet as secure as it needs to be anymore?
Fixating On The Edges
Commentary  |  9/26/2013  | 
Security folks tend to concentrate on their inability to block improbable attacks, while forgetting to focus on the attacks they're most likely to see
Flash Storage Has Special Security Needs
Commentary  |  9/26/2013  | 
Over-provisioning and bad-block marking can leave flash storage devices vulnerable to data theft. Here are workarounds.
You Are Not Over Budget -- You Underestimated
Commentary  |  9/25/2013  | 
When forces align to underfund IT projects, they guarantee an ugly finish
The Big Data Is The New Normal
Commentary  |  9/24/2013  | 
Big data, not relational, is the new platform of choice
Dolloping Out Threat Intelligence
Commentary  |  9/21/2013  | 
When too much of a good thing causes confusion and setbacks
(ISC)2 Congress Addresses Security's People Problems
Commentary  |  9/20/2013  | 
Annual (ISC)2 conference puts technology aside to focus on the human side of security
It's New And Shiny. Be Afraid. Be Very Afraid.
Commentary  |  9/19/2013  | 
In the age of page views and breaking news, we have to reserve judgement until the facts emerge. Apple's Touch ID launch is just another example of fear-mongers favoring FUD over fact
Grand Theft Oh No: When Online Gamers Attack
Commentary  |  9/17/2013  | 
A new report says the tactics players use to slow down the competition may be trained on your site. Here's how to protect yourself.
For Security Pros, Maintaining Credibility Means Walking A Fine Line
Commentary  |  9/16/2013  | 
In security, crying wolf too often -- or too infrequently -- can both lead to big trouble
The NSA And Your Cloud Data: Navigating The Noise
Commentary  |  9/12/2013  | 
Revelations about the reach of the National Security Agency have made waves, but don't get overwhelmed.
Federal DDoS Warnings Are Outdated
Commentary  |  9/11/2013  | 
We shouldn't be relying on sporadic government warnings about potential distributed denial of service attacks. Having a comprehensive DDoS plan already in place is security 101.
So You Wanna Be A Pen Tester?
Commentary  |  9/9/2013  | 
Like anything you set out to do, it's best to start with the fundamentals
Dark Reading Launches New Tech Center On Security Analytics
Commentary  |  9/9/2013  | 
Dark Reading's new Security Analytics Tech Center offers a closer look at forensics, big data, and incident response
PII And Entitlement Management
Commentary  |  9/9/2013  | 
Data discovery and entitlement tools offer a better alternative to role-based access reports for compliance
Yet Another Reason To Hate Online Ads
Commentary  |  9/8/2013  | 
Through the magic of JavaScript and ad networks, research presented at Black Hat by Jeremiah Grossman and Matt Johansen shows how to build a huge botnet quickly -- and then the fun begins
Red Teaming the Electric Grid
Commentary  |  9/3/2013  | 
Tom Parker explores the complexities of an attack against the US bulk electric system.
An Unrestricted Syria
Commentary  |  9/3/2013  | 
Cyber on the table for Syria's possible response to a U.S. missile strike?
Energy Dept. Breach: Let's Get Back To Basics
Commentary  |  9/3/2013  | 
What can lack of internal cooperation and insufficient IT resources add up to create? Unpatched servers.
Software Patches Eat Government IT's Lunch
Commentary  |  9/3/2013  | 
The software industry's publish-now, update-later approach exacts a huge toll on government IT leaders like Robert Jack, CIO of the U.S. Marine Corps.


Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19619
PUBLISHED: 2019-12-06
domain/section/markdown/markdown.go in Documize before 3.5.1 mishandles untrusted Markdown content. This was addressed by adding the bluemonday HTML sanitizer to defend against XSS.
CVE-2019-19616
PUBLISHED: 2019-12-06
An Insecure Direct Object Reference (IDOR) vulnerability in the Xtivia Web Time and Expense (WebTE) interface used for Microsoft Dynamics NAV before 2017 allows an attacker to download arbitrary files by specifying arbitrary values for the recId and filename parameters of the /Home/GetAttachment fun...
CVE-2019-19617
PUBLISHED: 2019-12-06
phpMyAdmin before 4.9.2 does not escape certain Git information, related to libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php.
CVE-2012-1114
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
CVE-2012-1115
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.