Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

<<   <   Page 5 / 5
Study Reveals the Most Common Attack Methods of Data Thieves
Raja Patel, Vice President and General Manager of Network Security at Intel Security
Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach.
By Raja Patel Vice President and General Manager of Network Security at Intel Security, 7/30/2015
Comment1 Comment  |  Read  |  Post a Comment
Out of Aspen: State of Critical Infrastructure Cybersecurity, 2015
Steve Grobman , Chief Technology Officer at Intel Security
The good, bad, and potentially worse of critical infrastructure protection.
By Steve Grobman Chief Technology Officer at Intel Security, 7/22/2015
Comment0 comments  |  Read  |  Post a Comment
Are Criminals Quicker Than The Flash?
Rees Johnson, Sr. VP and GM the Content Security Business Unit, Intel Security
Using the right technology, we can defeat the malicious exploitation of Flash and return it to its full superhero status.
By Rees Johnson Sr. VP and GM the Content Security Business Unit, Intel Security, 7/14/2015
Comment0 comments  |  Read  |  Post a Comment
What Morpho Means: Why Hackers Target Intellectual Property And Business-Confidential Information
Raj Samani , Chief Technology Officer of Intel Security’s Europe, Middle East and Africa division
A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives business. Welcome to the new normal.
By Raj Samani Chief Technology Officer of Intel Security’s Europe, Middle East and Africa division, 7/13/2015
Comment2 comments  |  Read  |  Post a Comment
Franchising Ransomware
Vincent Weafer, Senior Vice President, Intel Security
Ransomware-as-a-service is fueling cyberattacks. Is your organization prepared?
By Vincent Weafer Senior Vice President, Intel Security, 7/1/2015
Comment3 comments  |  Read  |  Post a Comment
Securing Critical Infrastructure
Lorie Wigle, Vice President, General Manager IOT Security Solutions, Intel Security Group
Protecting the Industrial Internet of Things from cyberthreats is a national priority.
By Lorie Wigle Vice President, General Manager IOT Security Solutions, Intel Security Group, 6/30/2015
Comment1 Comment  |  Read  |  Post a Comment
Cyber Resilience And Spear Phishing
Mo Cashman, Director of the Enterprise Architecture team at Intel Security.
Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks.
By Mo Cashman Director of the Enterprise Architecture team at Intel Security. , 6/29/2015
Comment0 comments  |  Read  |  Post a Comment
The Secret Of War Lies In The Communications --Napoleon
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
DXL helps organizations keep an eye on external and internal threats using relevant information in real time.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 6/24/2015
Comment0 comments  |  Read  |  Post a Comment
An Effective Community Is More Than Just An Online Forum
Michael Sentonas, Chief Technology and Strategy Officer, APAC
It is important to develop a strong base of contributors who can communicate effectively, answer questions, and summarize issues.
By Michael Sentonas Chief Technology and Strategy Officer, APAC, 6/19/2015
Comment0 comments  |  Read  |  Post a Comment
The Promises And Perils Of The Healthcare Internet Of Things
Lorie Wigle, Vice President, General Manager IOT Security Solutions, Intel Security Group
Connected devices are working wonders for managing treatment, but their integration with consumer technology and cloud computing raises significant security issues.
By Lorie Wigle Vice President, General Manager IOT Security Solutions, Intel Security Group, 6/11/2015
Comment2 comments  |  Read  |  Post a Comment
Beware of Emails Bearing Gifts
Michael Sentonas, Chief Technology and Strategy Officer, APAC
A security-connected framework can help your organization thwart cybercrime.
By Michael Sentonas Chief Technology and Strategy Officer, APAC, 6/9/2015
Comment1 Comment  |  Read  |  Post a Comment
Securing Private and Hybrid Clouds
Raja Patel, Vice President and General Manager of Network Security at Intel Security
As-a-service models offer huge opportunities, but also complicate security.
By Raja Patel Vice President and General Manager of Network Security at Intel Security, 6/4/2015
Comment0 comments  |  Read  |  Post a Comment
What Are You Doing During The Golden Hour After An Attack?
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
Take the time to detect the attack, isolate the infected machines, and restore them to a known state.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 5/28/2015
Comment3 comments  |  Read  |  Post a Comment
The Cloud Revolution Requires High-Performance Attack Prevention
Rees Johnson, Sr. VP and GM the Content Security Business Unit, Intel Security
Where there is traffic, there are bandits.
By Rees Johnson Sr. VP and GM the Content Security Business Unit, Intel Security, 5/20/2015
Comment0 comments  |  Read  |  Post a Comment
Teaming Up to Educate and Enable Better Defense Against Phishing
Rees Johnson, Sr. VP and GM the Content Security Business Unit, Intel Security
Companies need to both educate their employees and implement prevention technology.
By Rees Johnson Sr. VP and GM the Content Security Business Unit, Intel Security, 5/13/2015
Comment4 comments  |  Read  |  Post a Comment
Defenses Outside the Wall
Lorie Wigle, Vice President, General Manager IOT Security Solutions, Intel Security Group
Protecting the Internet of Things means protecting the privacy of customers and colleagues.
By Lorie Wigle Vice President, General Manager IOT Security Solutions, Intel Security Group, 5/4/2015
Comment5 comments  |  Read  |  Post a Comment
Application Layer Exfiltration Protection: A New Perspective on Firewalls
Pat Calhoun, Senior Vice President & General Manager, Network Security at Intel Security
Organizations must adopt a new way of thinking about safeguarding sensitive data from theft and unauthorized exfiltration.
By Pat Calhoun Senior Vice President & General Manager, Network Security at Intel Security, 4/28/2015
Comment2 comments  |  Read  |  Post a Comment
‘Golden Hour’ Incident Response Agility
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
Security leaders must encourage and integrate data, processes, and controls to facilitate comprehension and investment of precious human capital in higher-level tasks.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
Predictive Analytics: The Future Is Now
Vincent Weafer, Senior Vice President, Intel Security
Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages.
By Vincent Weafer Senior Vice President, Intel Security, 4/15/2015
Comment0 comments  |  Read  |  Post a Comment
Botnet to Cybersecurity: Catch Me If You Can
Raj Samani , Chief Technology Officer of Intel Security’s Europe, Middle East and Africa division
Tracking and disrupting the crime ring behind a polymorphic botnet.
By Raj Samani Chief Technology Officer of Intel Security’s Europe, Middle East and Africa division, 4/14/2015
Comment0 comments  |  Read  |  Post a Comment
<<   <   Page 5 / 5
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Introducing 'Secure Access Service Edge'
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  7/3/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5604
PUBLISHED: 2020-07-09
Android App 'Mercari' (Japan version) prior to version 3.52.0 allows arbitrary method execution of a Java object by a remoto attacker via a Man-In-The-Middle attack by using Java Reflection API of JavaScript code on WebView.
CVE-2020-5974
PUBLISHED: 2020-07-08
NVIDIA JetPack SDK, version 4.2 and 4.3, contains a vulnerability in its installation scripts in which permissions are incorrectly set on certain directories, which can lead to escalation of privileges.
CVE-2020-15072
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An error-based SQL Injection vulnerability exists via the Import Administrators section.
CVE-2020-15073
PUBLISHED: 2020-07-08
An issue was discovered in phpList through 3.5.4. An XSS vulnerability occurs within the Import Administrators section via upload of an edited text document. This also affects the Subscriber Lists section.
CVE-2020-2034
PUBLISHED: 2020-07-08
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect...