Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

DRTV

Free endpoint scanning service powered by Open Threat Exchange
Free endpoint scanning service powered by Open Threat Exchange
Dark Reading Videos  |  4/19/2018  | 
Russ Spitler, AlienVaults SVP of Products, explains how security pros can leverage the community-powered threat intelligence of OTX which sees more than 19 million IoCs contributed daily by a global community of 80,000 peers to quickly protect themselves against emerging attacks.
Can machine learning improve your endpoint detection and response?
Can machine learning improve your endpoint detection and response?
Dark Reading Videos  |  4/19/2018  | 
To intervene with optimum efficiency, response team needs to zero in on the most potentially dangerous endpoint anomalies first. And according to Harish Agastya, VP of Enterprise Solutions at Bitdefender, machine learning-assisted EDR can help you do exactly that.
Successfully Using Deception Against APTs
Successfully Using Deception Against APTs
Dark Reading Videos  |  4/19/2018  | 
According to Illusive CEO Ofer Israeli, deception technology can provide a vital layer of protection from advanced persistent threats (APTs) by presenting attackers with seemingly genuine servers that both divert them from high-value digital assets and make it easier to pinpoint malicious network activity.
Should CISOs Be Hackers?
Should CISOs Be Hackers?
Dark Reading Videos  |  4/19/2018  | 
Justin Calmus, Chief Security Officer at OneLogin, believes that cybersecurity professionals including CISOs and other security team leaders can be much more effective at their jobs if they stay actively engaged with hacking communities that keep them on their toes and give them deep insight into attack trends.
Protecting Data Anywhere and Everywhere
Protecting Data Anywhere and Everywhere
Dark Reading Videos  |  4/19/2018  | 
SecurityFirst CEO Jim Varner explains how resellers and MSPs can work with their clients to ensure that all of their business-critical data everywhere can be kept safe from attackers and readily available for disaster recovery even as threats intensify and digital assets are dispersed across multiple clouds.
Supporting Infosec Needs for Cybersecurity Speed, Scope and Skills
Supporting Infosec Needs for Cybersecurity Speed, Scope and Skills
Dark Reading Videos  |  4/19/2018  | 
Given intensifying threats and limited infosec budgets, Endgame CTO Jamie Butler suggests that security leaders deploy tools that leverage machine learning, chatbots, and other technologies to make Tier 1/Tier 2 staff much more effective at stopping even relatively sophisticated attacks.
Using Carrier Intelligence to Validate Mobile User Identity
Using Carrier Intelligence to Validate Mobile User Identity
Dark Reading Videos  |  4/19/2018  | 
To confidently validate the identity of mobile users without adding business-killing friction to login and on-boarding processes, Lea Tarnowski and Wendell Brown of Averon suggest leveraging the intelligence mobile carriers already have about their customers.
Stopping Bots and Credential Stuffing: A Smarter Strategy
Stopping Bots and Credential Stuffing: A Smarter Strategy
Dark Reading Videos  |  4/18/2018  | 
Patrick Sullivan, Senior Director Security Strategy at Akamai Technologies, explains why cybersecurity teams need better mechanisms for controlling bot activity and why all bots are not created equal.
Leveraging Threat Intelligence across Infosec Roles
Leveraging Threat Intelligence across Infosec Roles
Dark Reading Videos  |  4/18/2018  | 
Allan Liska, Senior Security Architect at Recorded Future, believes everyone in the infosec team including vulnerability management and threat response staff can take greater advantage of available threat intelligence to more effectively and efficiently mitigate risk.
Practically Applying Threat Intelligence to Your Business
Practically Applying Threat Intelligence to Your Business
Dark Reading Videos  |  4/18/2018  | 
Travis Farral, Director of Security Strategy at Anomali, believes cybersecurity teams can operate much more efficiently by better identifying the specific threats that endanger their environment and by better understanding the potential impacts of those specific threats.
Enabling Appropriate User Access in a Zero Trust World
Enabling Appropriate User Access in a Zero Trust World
Dark Reading Videos  |  4/18/2018  | 
Bill Mann, Chief Product Officer at Centrify, suggests some strategies for securing todays perimeter-less enterprise environments including stronger enforcement of well-defined policies for user access, integration of security into DevOps processes, and smarter use of ML for anomaly detection.
Keeping the Business Safe Across Hybrid Cloud Environments
Keeping the Business Safe Across Hybrid Cloud Environments
Dark Reading Videos  |  4/18/2018  | 
Aggressive cloud adoption increases threat surface and makes it more difficult for infosec teams to keep track of what the business is doing. Donald Meyer, Head of Data Center and Cloud at Check Point Software, explains how infosec teams can more effectively mitigate risk without hampering business agility.
Beating Zero-Payload/Fileless Attacks with Unified EPP/EDR
Beating Zero-Payload/Fileless Attacks with Unified EPP/EDR
Dark Reading Videos  |  4/18/2018  | 
To cope with todays fileless endpoint attacks especially those that arent precisely similar to previously known exploits Tomer Weingarten and Nicholas Warner of SentinelOne suggest a unified EPP/EDR approach that includes visibility into the dangers lurking within encrypted network traffic.
Optimizing the Security Awareness of Your End-Users
Optimizing the Security Awareness of Your End-Users
Dark Reading Videos  |  4/18/2018  | 
End-users can be the weakest link in your infosec defense. But according to KnowBe4 founder and CEO Stu Sjouwerman, there is something you can do about that if you implement the right behavioral diagnostics and focus your training needs on individual users actual weaknesses.


Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9308
PUBLISHED: 2020-02-20
archive_read_support_format_rar5.c in libarchive before 3.4.2 attempts to unpack a RAR5 file with an invalid or corrupted header (such as a header size of zero), leading to a SIGSEGV or possibly unspecified other impact.
CVE-2019-20479
PUBLISHED: 2020-02-20
A flaw was found in mod_auth_openidc before version 2.4.1. An open redirect issue exists in URLs with a slash and backslash at the beginning.
CVE-2011-2498
PUBLISHED: 2020-02-20
The Linux kernel from v2.3.36 before v2.6.39 allows local unprivileged users to cause a denial of service (memory consumption) by triggering creation of PTE pages.
CVE-2012-2629
PUBLISHED: 2020-02-20
Multiple cross-site request forgery (CSRF) and cross-site scripting (XSS) vulnerabilities in Axous 1.1.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator account via an addnew action to admin/administrators_add.php; or (2) c...
CVE-2014-3484
PUBLISHED: 2020-02-20
Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid ...