Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

12/27/2016
08:00 AM
Marilyn Cohodas
Marilyn Cohodas
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Greatest Hits Of 2016: Readers' Picks For The Years' Best Commentary

Here's what topped the Dark Reading page-view charts from the security industry's brightest minds, coolest rock stars, and up-and-coming leaders.

The hacking thriller Mr. Robot may have been snubbed by the 2017 Golden Globe Award nominating committee this month, but security researcher Sarah Vonnegut’s blog -  5 'Mr. Robot' Hacks That Could Happen in Real Life - about the award-winning season one, pulled in the highest numbers of readers of all the contributed content we published in 2016.

Vonnegut, an application security community specialist at Checkmarx, offered a reality check to anti-hero Elliot’s premier season hacking prowess, and garnered a whopping 14,738  page views from Dark Reading fans of the show.  

Other 2016 favorites from our roster of contributors include: 

Rethinking Application Security With Microservices Architectures (6,804 views, 4/15/2016)
Ranga Rajagopalan, Chief Technology Officer, Avi Networks
The advantages offered by the container model go against many of the assumptions of traditional security mechanisms. Here are 5 new concepts & 4 best practices you'll need to understand.

Security Portfolios: A Different Approach To Leadership (6,802 views, 8/11/2016) 
Adam Shostack, Founder, Stealth Startup 
How grounding a conversation around a well-organized list of controls and their goals can help everyone be, literally, on the same page. Part seven of an ongoing series.

How To Stay Safe On The Black Hat Network (6,722 views, 7/28/2016) 
Neil R. Wyler (Grifter), Threat Hunting and Incident Response Specialist, RSA
Black Hat attendees may have changed their titles and now carry business cards but hackers gotta hack and there's no better place to do it than Black Hat.

The Secret Behind the NSA Breach: Network Infrastructure Is The Next Target (6,683 views, 8/25/2016) 
Yoni Allon Research Team Leader, LightCyber
How the networking industry has fallen way behind in incorporating security measures to prevent exploits to ubiquitous routers, proxies, firewalls, and switches.

Anatomy Of An Account Takeover Attack (6,389 views, 2/23/2016)
Ting-Fang Yen, Research Scientist, Datavisor, Inc.
How organized crime rings are amassing bot armies for password-cracking attacks on personal accounts in retail, financial, gaming, and other consumer-facing services.

20 Endpoint Security Questions You Never Thought to Ask  (5,696 views, 10/26/2016)
Joshua Goldfarb. VP & CTO - Emerging Technologies, FireEye
The endpoint detection and response market is exploding! Here's how to make sense of the options, dig deeper, and separate vendor fact from fiction.

5 Soft Skills Young Cybersecurity Professionals Need to Get Ahead (5,615 views 6/14/2016)
Todd Thibodeaux, President & CEO, CompTIA
Today's employers aren't looking for recruits who can maintain firewalls and mitigate risk. They want well-rounded professionals who can apply security expertise across the business to yield bottom-line results.

Why Social Media Sites Are The New Cyber Weapons Of Choice (5,387 views, 9/6/2016)
Nick Hayes, Analyst, Forrester
Facebook, LinkedIn, and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security acumen.

Changing IoT Passwords Won't Stop Attacks. Here's What Will (5,173 views, 11/7/2016)
Paul Madsen, Senior Technical Architect, Ping Identity
The solution will take an industry-wide effort, it won't happen overnight, and the problem is not the users' fault!

Do you have a favorite contributor commentary of 2016? Share it in the comments!

Related Content:

 

 

 

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
waynebishop
50%
50%
waynebishop,
User Rank: Apprentice
2/8/2017 | 3:53:02 AM
Re: wikitrader trading app
good one
AlexJ045
50%
50%
AlexJ045,
User Rank: Apprentice
12/29/2016 | 2:30:02 AM
wikitrader trading app
Your articles and contents are encouraging.
wikitrader trading app
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4537
PUBLISHED: 2020-02-26
IBM WebSphere Service Registry and Repository 8.5 could allow a user to obtain sensitive version information that could be used in further attacks against the system. IBM X-Force ID: 165593.
CVE-2019-4596
PUBLISHED: 2020-02-26
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session...
CVE-2019-4597
PUBLISHED: 2020-02-26
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167880.
CVE-2019-4598
PUBLISHED: 2020-02-26
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 167881.
CVE-2019-4726
PUBLISHED: 2020-02-26
IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 172363.