Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

<<   <   Page 2 / 5   >   >>
Ransomware: Coming To A Hospital Near You?
Christiaan Beek, Threat Intelligence Research, Office of the CTO,Intel Security
10 ways to protect healthcare systems from ransomware and other malware infections.
By Christiaan Beek Threat Intelligence Research, Office of the CTO,Intel Security, 9/26/2016
Comment10 comments  |  Read  |  Post a Comment
The Time Is Now To Address The Cybersecurity Talent Shortage In Unique Ways
Jeannette Jarvis, Director, Product Management for Intel Security
Cultivating talent from unaccustomed outlets will benefit all of us.
By Jeannette Jarvis Director, Product Management for Intel Security, 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
Password Reuse: Don’t Mix Business With Personal
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
Employee education, password managers, and multifactor authentication can reduce the risk of a personal breach becoming a corporate security event.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 9/14/2016
Comment1 Comment  |  Read  |  Post a Comment
Government Accelerates Cyber Hiring
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
The federal government is looking to add 3,500 more cyber and IT workers by January 2017.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
Improvements In Cybersecurity Require More Than Sharing Threat-Intelligence Information
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
Interoperability and automation are keys to defining success in computer network defense.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 9/1/2016
Comment0 comments  |  Read  |  Post a Comment
Advanced Threat Hunting: Are You The Hunter Or The Hunted?
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
Make proactive threat hunting a standard part of your security best practices and not just an element of incident-response measures.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 8/10/2016
Comment0 comments  |  Read  |  Post a Comment
People Who Work Together Will Win
Josh Thurston, Security Strategist - Americas, Office of the CTO, Intel Security
It’s time for an updated security strategy, built on efficiency and automation.
By Josh Thurston Security Strategist - Americas, Office of the CTO, Intel Security, 8/9/2016
Comment0 comments  |  Read  |  Post a Comment
Guarding The Grid
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
Quietly and without much public recognition, the National Guard has been developing a sophisticated capability for cyberdefense.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 8/8/2016
Comment0 comments  |  Read  |  Post a Comment
There’s Something Phishy in the Package
Jonathan King, Security Technologist and Intel Principal Engineer in the Intel Security Office of the CTO
The typosquatting risk is real. It’s time to increase our vigilance and control over third-party source code.
By Jonathan King Security Technologist and Intel Principal Engineer in the Intel Security Office of the CTO, 8/5/2016
Comment0 comments  |  Read  |  Post a Comment
Five Ingredients Of An Intelligence-Driven Security Operations Center: Part 3 In A Series
Brett Kelsey, VP & Chief Technology Officer, Americas, Intel Security
As enterprises adopt new ways of thinking about security, they also must make changes in their operations centers to support the new mindset. Here’s what’s needed.
By Brett Kelsey VP & Chief Technology Officer, Americas, Intel Security, 7/21/2016
Comment0 comments  |  Read  |  Post a Comment
Context-Rich And Context-Aware Cybersecurity
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 7/14/2016
Comment1 Comment  |  Read  |  Post a Comment
Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
Brett Kelsey, VP & Chief Technology Officer, Americas, Intel Security
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.
By Brett Kelsey VP & Chief Technology Officer, Americas, Intel Security, 6/23/2016
Comment0 comments  |  Read  |  Post a Comment
The Importance Of Taking A More Active Role To Protect Our Data
Josh Thurston, Security Strategist - Americas, Office of the CTO, Intel Security
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.
By Josh Thurston Security Strategist - Americas, Office of the CTO, Intel Security, 6/23/2016
Comment0 comments  |  Read  |  Post a Comment
Why Everyone Is Rallying Around ‘Adaptive Security’: Part 1
Brett Kelsey, VP & Chief Technology Officer, Americas, Intel Security
Three intertwined security realities are compelling enterprises to transition from a set-and-forget approach to an adaptive security strategy.
By Brett Kelsey VP & Chief Technology Officer, Americas, Intel Security, 6/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Mobile App Collusion, The State Of Hashing, And A Troublesome Trojan Returns
Vincent Weafer, Senior Vice President, Intel Security
Highlights from the June 2016 McAfee Labs Threats Report.
By Vincent Weafer Senior Vice President, Intel Security, 6/14/2016
Comment0 comments  |  Read  |  Post a Comment
From Paper To Plastic To Bits
Josh Thurston, Security Strategist - Americas, Office of the CTO, Intel Security
Paying with your phone or other electronic wallets increases transaction security.
By Josh Thurston Security Strategist - Americas, Office of the CTO, Intel Security, 6/8/2016
Comment0 comments  |  Read  |  Post a Comment
Bots -- Harmful Or Helpful?
Lynda Grindstaff, Senior Director of the Innovation Pipeline, Intel Security
As good bots grow in popularity and sophistication, bad bots will also grow in complexity to evade current tools and imitate humans.
By Lynda Grindstaff Senior Director of the Innovation Pipeline, Intel Security, 6/7/2016
Comment1 Comment  |  Read  |  Post a Comment
1 Security Incident x 4 Tools x 8 Roles = 8 Days
Brian Dye, Corporate Vice President, Intel Security Group General Manager, Corporate Products
Collaboration can significantly improve this equation.
By Brian Dye Corporate Vice President, Intel Security Group General Manager, Corporate Products, 5/25/2016
Comment0 comments  |  Read  |  Post a Comment
Looking Forward: A Skilled Security Talent Shortage Looms
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
The skilled security workforce crisis will continue for the foreseeable future, even as expert systems are deployed.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 5/19/2016
Comment1 Comment  |  Read  |  Post a Comment
Cloud SLAs: What Everyone Should Know
Jamie Tischart, CTO, Cloud & SaaS Technologies, Intel Security
13 questions to ask your service providers to better understand their service offerings and your risks.
By Jamie Tischart CTO, Cloud & SaaS Technologies, Intel Security, 5/18/2016
Comment0 comments  |  Read  |  Post a Comment
<<   <   Page 2 / 5   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15570
PUBLISHED: 2020-07-06
The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
CVE-2020-15569
PUBLISHED: 2020-07-06
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
CVE-2020-7690
PUBLISHED: 2020-07-06
It's possible to inject JavaScript code via the html method.
CVE-2020-7691
PUBLISHED: 2020-07-06
It's possible to use &lt;&lt;script&gt;script&gt; in order to go over the filtering regex.
CVE-2020-15562
PUBLISHED: 2020-07-06
An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.