Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

3/19/2016
09:00 AM
Sara Peters
Sara Peters
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv
50%
50%

Tell DR: What Are Your Biggest Unanswered Security Questions?

Fill us in, Dark Reading community. What challenges and mysteries leave you scratching your heads and throwing up your hands?

We know you're smart.

Yet, even smart, savvy security whizzes have questions they don't know the answers to. Obstacles they can't overcome. Broken things they can't fix. Mysteries they can't  solve. Mazes they can't escape. Problems, puzzles, and paradoxes that persist.

So be honest with us: what are yours?

Maybe you don't know how to respond when your CFO asks you for the security department's Return on Investment. Maybe you don't know how to react to a ransomware infection. Maybe you still just aren't sure what "advanced persistent threat" means. Maybe you want to know if your favorite cybersecurity celebrities are just like you. Maybe you can't figure out why more talented people won't join your security team. Maybe you need someone to explain encryption, or hacktivism, or Dr. Who and you're afraid to ask your co-workers.

Maybe it's none of those. So tell us.

Sure, we're curious, but we're not just being nosy. We want to help. Give us your most burning questions and Dark Reading will investigate. We'll report back with stories, videos, and events that might help you unravel some of the mysteries that boggle the minds, pain the souls, and waste the time of infosec professionals.

Spill your guts in the comments below.

 

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
3/20/2016 | 3:49:33 PM
weighing in
"Maybe you can't figure out why more talented people won't join your security team."

A few months ago, I was asked to interview for a CISO position at a global mid-size enterprise.

For starters, the pay was below industry average.  Not too bad...except for the fact that, (1) the "requirements" in the job posting represented fanciful thinking -- even for industry standard -- and (2) as far as I could tell, the company's data protection policies were virtually nil outside of far-too-often mandated password changes.  (Meanwhile, the physical security was woeful.)  The person this company eventually hires will have to build everything pretty much from scratch.

What's more, the position was more of a "CISO-plus" role -- combining the roles of the CISO, the CCO, and the CPO.  Additionally, the job had three bosses -- but with no real budget for the department/goals of the role.

They still haven't filled the role -- and they've recently reposted the identical job posting except with a less impressive job title (apparently to try to disguise the fact that the pay is below average).

So, there's that.



jwsh143
50%
50%
jwsh143,
User Rank: Apprentice
3/21/2016 | 11:34:14 AM
Re: weighing in
How does a one person shop in a SMB handle information Security, compliance and audit?  300 employees.
Sara Peters
50%
50%
Sara Peters,
User Rank: Author
3/21/2016 | 11:39:04 AM
Re: weighing in
Oooh good one! I assume cloning yourself isn't in the budget...
jwsh143
50%
50%
jwsh143,
User Rank: Apprentice
3/21/2016 | 11:42:15 AM
Re: weighing in
Yep, cloning myself isn't in the budget.  I wish it was.
theb0x
50%
50%
theb0x,
User Rank: Ninja
3/23/2016 | 11:20:09 AM
Darkreading
I would like to know why Darkreading/Information Week still to this day does not offer a secure member login? I suppose this is also a risk for any Authors that post articles to the site as well.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/23/2016 | 11:55:46 AM
What else dont we know
My question is always around what are those unknown unknowns.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/23/2016 | 11:57:46 AM
Re: weighing in
"... the fact that the pay is below average .."

Unfortunately this is  always the case. They want you to do more work with less salary.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/23/2016 | 12:00:29 PM
Re: weighing in
"... one person shop ..."

I really do not have an answer but this is the reality. Just one step at a time. Unless we start using robots.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/23/2016 | 12:04:59 PM
Re: weighing in
"... no real budget for the department/goals of the role. ..."

This is quite common, there is no real budget for security, it comes in after the attacks.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/23/2016 | 12:07:27 PM
Re: Darkreading
"... a secure member login ..."

I assume because what we have here is a public data.
Page 1 / 2   >   >>
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.