Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

<<   <   Page 2 / 5   >   >>
Ransomware: Coming To A Hospital Near You?
Christiaan Beek, Threat Intelligence Research, Office of the CTO,Intel Security
10 ways to protect healthcare systems from ransomware and other malware infections.
By Christiaan Beek Threat Intelligence Research, Office of the CTO,Intel Security, 9/26/2016
Comment10 comments  |  Read  |  Post a Comment
The Time Is Now To Address The Cybersecurity Talent Shortage In Unique Ways
Jeannette Jarvis, Director, Product Management for Intel Security
Cultivating talent from unaccustomed outlets will benefit all of us.
By Jeannette Jarvis Director, Product Management for Intel Security, 9/19/2016
Comment0 comments  |  Read  |  Post a Comment
Password Reuse: Don’t Mix Business With Personal
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
Employee education, password managers, and multifactor authentication can reduce the risk of a personal breach becoming a corporate security event.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 9/14/2016
Comment1 Comment  |  Read  |  Post a Comment
Government Accelerates Cyber Hiring
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
The federal government is looking to add 3,500 more cyber and IT workers by January 2017.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 9/12/2016
Comment0 comments  |  Read  |  Post a Comment
Improvements In Cybersecurity Require More Than Sharing Threat-Intelligence Information
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
Interoperability and automation are keys to defining success in computer network defense.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 9/1/2016
Comment0 comments  |  Read  |  Post a Comment
Advanced Threat Hunting: Are You The Hunter Or The Hunted?
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
Make proactive threat hunting a standard part of your security best practices and not just an element of incident-response measures.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 8/10/2016
Comment0 comments  |  Read  |  Post a Comment
People Who Work Together Will Win
Josh Thurston, Security Strategist - Americas, Office of the CTO, Intel Security
It’s time for an updated security strategy, built on efficiency and automation.
By Josh Thurston Security Strategist - Americas, Office of the CTO, Intel Security, 8/9/2016
Comment0 comments  |  Read  |  Post a Comment
Guarding The Grid
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
Quietly and without much public recognition, the National Guard has been developing a sophisticated capability for cyberdefense.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 8/8/2016
Comment0 comments  |  Read  |  Post a Comment
There’s Something Phishy in the Package
Jonathan King, Security Technologist and Intel Principal Engineer in the Intel Security Office of the CTO
The typosquatting risk is real. It’s time to increase our vigilance and control over third-party source code.
By Jonathan King Security Technologist and Intel Principal Engineer in the Intel Security Office of the CTO, 8/5/2016
Comment0 comments  |  Read  |  Post a Comment
Five Ingredients Of An Intelligence-Driven Security Operations Center: Part 3 In A Series
Brett Kelsey, VP & Chief Technology Officer, Americas, Intel Security
As enterprises adopt new ways of thinking about security, they also must make changes in their operations centers to support the new mindset. Here’s what’s needed.
By Brett Kelsey VP & Chief Technology Officer, Americas, Intel Security, 7/21/2016
Comment0 comments  |  Read  |  Post a Comment
Context-Rich And Context-Aware Cybersecurity
Ned Miller, Intel Security, Chief Technology Strategist for Public Sector
An adaptive threat-prevention model is quickly replacing traditional, unintegrated architectures as security teams work to achieve a sustainable advantage against complex threats.
By Ned Miller Intel Security, Chief Technology Strategist for Public Sector, 7/14/2016
Comment1 Comment  |  Read  |  Post a Comment
Adaptive Security Demands A Shift In Mindset: Part 2 In A Series
Brett Kelsey, VP & Chief Technology Officer, Americas, Intel Security
By adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.
By Brett Kelsey VP & Chief Technology Officer, Americas, Intel Security, 6/23/2016
Comment0 comments  |  Read  |  Post a Comment
The Importance Of Taking A More Active Role To Protect Our Data
Josh Thurston, Security Strategist - Americas, Office of the CTO, Intel Security
Big data has lots of potential to make our decisions more efficient and effective. But like any powerful substance, too much in the wrong hands can have disastrous consequences.
By Josh Thurston Security Strategist - Americas, Office of the CTO, Intel Security, 6/23/2016
Comment0 comments  |  Read  |  Post a Comment
Why Everyone Is Rallying Around ‘Adaptive Security’: Part 1
Brett Kelsey, VP & Chief Technology Officer, Americas, Intel Security
Three intertwined security realities are compelling enterprises to transition from a set-and-forget approach to an adaptive security strategy.
By Brett Kelsey VP & Chief Technology Officer, Americas, Intel Security, 6/15/2016
Comment1 Comment  |  Read  |  Post a Comment
Mobile App Collusion, The State Of Hashing, And A Troublesome Trojan Returns
Vincent Weafer, Senior Vice President, Intel Security
Highlights from the June 2016 McAfee Labs Threats Report.
By Vincent Weafer Senior Vice President, Intel Security, 6/14/2016
Comment0 comments  |  Read  |  Post a Comment
From Paper To Plastic To Bits
Josh Thurston, Security Strategist - Americas, Office of the CTO, Intel Security
Paying with your phone or other electronic wallets increases transaction security.
By Josh Thurston Security Strategist - Americas, Office of the CTO, Intel Security, 6/8/2016
Comment0 comments  |  Read  |  Post a Comment
Bots -- Harmful Or Helpful?
Lynda Grindstaff, Senior Director of the Innovation Pipeline, Intel Security
As good bots grow in popularity and sophistication, bad bots will also grow in complexity to evade current tools and imitate humans.
By Lynda Grindstaff Senior Director of the Innovation Pipeline, Intel Security, 6/7/2016
Comment1 Comment  |  Read  |  Post a Comment
1 Security Incident x 4 Tools x 8 Roles = 8 Days
Brian Dye, Corporate Vice President, Intel Security Group General Manager, Corporate Products
Collaboration can significantly improve this equation.
By Brian Dye Corporate Vice President, Intel Security Group General Manager, Corporate Products, 5/25/2016
Comment0 comments  |  Read  |  Post a Comment
Looking Forward: A Skilled Security Talent Shortage Looms
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
The skilled security workforce crisis will continue for the foreseeable future, even as expert systems are deployed.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 5/19/2016
Comment1 Comment  |  Read  |  Post a Comment
Cloud SLAs: What Everyone Should Know
Jamie Tischart, CTO, Cloud & SaaS Technologies, Intel Security
13 questions to ask your service providers to better understand their service offerings and your risks.
By Jamie Tischart CTO, Cloud & SaaS Technologies, Intel Security, 5/18/2016
Comment0 comments  |  Read  |  Post a Comment
<<   <   Page 2 / 5   >   >>
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-2319
PUBLISHED: 2019-12-12
HLOS could corrupt CPZ page table memory for S1 managed VMs in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in MDM9205, QCS404, QCS605, SDA845, SDM670, SDM710, SDM84...
CVE-2019-2320
PUBLISHED: 2019-12-12
Possible out of bounds write in a MT SMS/SS scenario due to improper validation of array index in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables in APQ8009, APQ8017, APQ805...
CVE-2019-2321
PUBLISHED: 2019-12-12
Incorrect length used while validating the qsee log buffer sent from HLOS which could then lead to remap conflict in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdra...
CVE-2019-2337
PUBLISHED: 2019-12-12
While Skipping unknown IES, EMM is reading the buffer even if the no of bytes to read are more than message length which may cause device to shutdown in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ809...
CVE-2019-2338
PUBLISHED: 2019-12-12
Crafted image that has a valid signature from a non-QC entity can be loaded which can read/write memory that belongs to the secure world in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastruc...