Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

News & Commentary
Gap Between Security and Networking Teams May Hinder Tech Projects
Dark Reading Staff, Quick Hits
Professionals in each field describe a poor working relationship between the two teams
By Dark Reading Staff , 5/5/2021
Comment0 comments  |  Read  |  Post a Comment
Wanted: The (Elusive) Cybersecurity 'All-Star'
Steve Zurier, Contributing WriterNews
Separate workforce studies by (ISC) and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.
By Steve Zurier Contributing Writer, 5/5/2021
Comment1 Comment  |  Read  |  Post a Comment
Dark Reading Celebrates 15th Anniversary
Tim Wilson, Editor in Chief, Dark Reading, Commentary
Cybersecurity news site begins 16th year with plans to improve site, deliver more content on cyber threats and best practices.
By Tim Wilson, Editor in Chief, Dark Reading , 5/3/2021
Comment0 comments  |  Read  |  Post a Comment
Challenging Our Education System to Nurture the Cyber Pipeline
Stephanie Aceves, Senior Director, Threat Response SME Lead, at TaniumCommentary
Let's teach students how to teach themselves. Once we do that, we will have taught a generation of students how to think like hackers.
By Stephanie Aceves Senior Director, Threat Response SME Lead, at Tanium, 4/27/2021
Comment0 comments  |  Read  |  Post a Comment
In Appreciation: Dan Kaminsky
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Beloved security industry leader and researcher passes away unexpectedly at the age of 42.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/26/2021
Comment0 comments  |  Read  |  Post a Comment
KnowBe4 Issues IPO to Drive Global Expansion, New Automation Features
Robert Lemos, Contributing WriterNews
Security awareness firm aims expand into Europe and Asia, and add automation and machine learning to its technology.
By Robert Lemos Contributing Writer, 4/23/2021
Comment0 comments  |  Read  |  Post a Comment
Name That Toon: Greetings, Earthlings
John Klossner, CartoonistCommentary
Caption time! Come up with something out of this world for Dark Reading's latest contest, and our panel of experts will reward the winner with a $25 Amazon gift card.
By John Klossner Cartoonist, 4/22/2021
Comment17 comments  |  Read  |  Post a Comment
Dark Reading to Upgrade Site Design, Performance
Tim Wilson, Editor in Chief, Dark Reading, Commentary
Improvements will make site content easier to navigate, faster, and more functional.
By Tim Wilson, Editor in Chief, Dark Reading , 4/13/2021
Comment1 Comment  |  Read  |  Post a Comment
Biden Nominates Former NSA Officials for Top Cybersecurity Roles
Kelly Sheridan, Staff Editor, Dark ReadingNews
President Biden has nominated Jen Easterly as the new director of CISA and is expected to nominate Chris Inglis as the first national cyber director.
By Kelly Sheridan Staff Editor, Dark Reading, 4/12/2021
Comment0 comments  |  Read  |  Post a Comment
Women Are Facing an Economic Crisis & the Cybersecurity Industry Can Help
Sabrina Castiglione, Chief Financial Officer & Acting Head of TalentCommentary
Investing in women's cybersecurity careers can bring enormous benefits and help undo some of the significant economic damage wrought by the pandemic.
By Sabrina Castiglione Chief Financial Officer & Acting Head of Talent, 4/9/2021
Comment0 comments  |  Read  |  Post a Comment
Handcuffs Over AI: Solving Security Challenges With Law Enforcement
Charles Herring, CTO and Co-Founder, WitFooCommentary
We've tried everything else ... now it's time to make the prospect of getting caught -- and punished -- a real deterrent to cybercrime.
By Charles Herring CTO and Co-Founder, WitFoo, 4/8/2021
Comment4 comments  |  Read  |  Post a Comment
Cartoon Caption Winner: Something Seems Afoul
John Klossner, CartoonistCommentary
And the winner of Dark Readings's March cartoon caption contest is ...
By John Klossner Cartoonist, 4/7/2021
Comment0 comments  |  Read  |  Post a Comment
US Tech Dominance Rides on Securing Intellectual Property
Joe Payne, President and CEO at Code42Commentary
A recent, mostly overlooked pardon points to a big problem in the US tech industry: Intellectual property offers a lucrative golden ticket for insiders.
By Joe Payne President and CEO at Code42, 4/2/2021
Comment0 comments  |  Read  |  Post a Comment
Solving the Leadership Buy-In Impasse With Data
Richard Amburgey, Chief Security Officer (CSO), Bureau of Labor StatisticsCommentary
Justify your requirements with real numbers to get support for security investments.
By Richard Amburgey Chief Security Officer (CSO), Bureau of Labor Statistics, 4/1/2021
Comment0 comments  |  Read  |  Post a Comment
Advice From Security Experts: How to Approach Security in the New Normal
Dan Dinnar, CEO, Source DefenseCommentary
Here are the biggest lessons they've learned after a year of work from home, and how they advise their counterparts at organizations to proceed as a result of those lessons.
By Dan Dinnar CEO, Source Defense, 3/31/2021
Comment0 comments  |  Read  |  Post a Comment
Data Bias in Machine Learning: Implications for Social Justice
Christelle Kamaliza & Suzannah Hicks, Market Research Specialist / Data Scientist & Strategist, IAPPCommentary
Take historically biased data, then add AI and ML to compound and exacerbate the problem.
By Christelle Kamaliza & Suzannah Hicks Market Research Specialist / Data Scientist & Strategist, IAPP, 3/26/2021
Comment0 comments  |  Read  |  Post a Comment
Security Operations in the World We Live in Now
Amos Stern, CEO & Co-Founder, SiemplifyCommentary
Despite the challenges of remote work, security operations teams can position themselves well for the future.
By Amos Stern CEO & Co-Founder, Siemplify, 3/25/2021
Comment0 comments  |  Read  |  Post a Comment
The CIO's Shifting Role: Improving Security With Shared Responsibility
Keith Neilson, Technical Evangelist for CloudSphereCommentary
CIOs must create a culture centered around cybersecurity that is easily visible and manageable.
By Keith Neilson Technical Evangelist for CloudSphere, 3/25/2021
Comment0 comments  |  Read  |  Post a Comment
CSA & ISACA Team Up on Cloud Auditing Certificate
Kelly Sheridan, Staff Editor, Dark ReadingNews
The Certificate of Cloud Auditing Knowledge aims to fill a gap in the market for cloud IT auditing as more organizations work in cloud environments.
By Kelly Sheridan Staff Editor, Dark Reading, 3/22/2021
Comment0 comments  |  Read  |  Post a Comment
Qualys CEO Courtot Departs for Health Reasons
Dark Reading Staff, Quick Hits
The well-known security industry entrepreneur initially took a leave of absence in February.
By Dark Reading Staff , 3/22/2021
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-10
On BIG-IP version 16.0.x before and 15.1.x before 15.1.3, malformed HTTP/2 requests may cause an infinite loop which causes a Denial of Service for Data Plane traffic. TMM takes the configured HA action when the TMM process is aborted. There is no control plane exposure, this is a data plan...
PUBLISHED: 2021-05-10
On versions 16.0.x before, 15.1.x before 15.1.2, 14.1.x before, 13.1.x before, and 12.1.x before, when the BIG-IP ASM/Advanced WAF system processes WebSocket requests with JSON payloads using the default JSON Content Profile in the ASM Security Policy, the BIG-IP ...
PUBLISHED: 2021-05-10
On BIG-IP versions 16.0.x before, 15.1.x before 15.1.3, 14.1.x before 14.1.4, and 13.1.x before 13.1.4, lack of input validation for items used in the system support functionality may allow users granted either "Resource Administrator" or "Administrator" roles to execute...
PUBLISHED: 2021-05-10
On versions 16.0.x before, 15.1.x before 15.1.3, and 14.1.x before 14.1.4, BIG-IP Advanced WAF and ASM are missing authorization checks for file uploads to a specific directory within the REST API which might allow Authenticated users with guest privileges to upload files. Note: Software ve...
PUBLISHED: 2021-05-10
On BIG-IP 15.1.x before 15.1.3, 14.1.x before, through, and all versions of 16.0.x, when running in Appliance Mode, an authenticated user assigned the 'Administrator' role may be able to bypass Appliance Mode restrictions utilizing undisclosed iControl REST endpoints. Note...