Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

<<   <   Page 5 / 5
Study Reveals the Most Common Attack Methods of Data Thieves
Raja Patel, Vice President and General Manager of Network Security at Intel Security
Learning more about your attackers helps to improve your security profile and reduce the possibility of a breach.
By Raja Patel Vice President and General Manager of Network Security at Intel Security, 7/30/2015
Comment1 Comment  |  Read  |  Post a Comment
Out of Aspen: State of Critical Infrastructure Cybersecurity, 2015
Steve Grobman , Chief Technology Officer at Intel Security
The good, bad, and potentially worse of critical infrastructure protection.
By Steve Grobman Chief Technology Officer at Intel Security, 7/22/2015
Comment0 comments  |  Read  |  Post a Comment
Are Criminals Quicker Than The Flash?
Rees Johnson, Sr. VP and GM the Content Security Business Unit, Intel Security
Using the right technology, we can defeat the malicious exploitation of Flash and return it to its full superhero status.
By Rees Johnson Sr. VP and GM the Content Security Business Unit, Intel Security, 7/14/2015
Comment0 comments  |  Read  |  Post a Comment
What Morpho Means: Why Hackers Target Intellectual Property And Business-Confidential Information
Raj Samani , Chief Technology Officer of Intel Security’s Europe, Middle East and Africa division
A quiet, professional cyberespionage group steals what every company wants to keep secret: valuable information that drives business. Welcome to the new normal.
By Raj Samani Chief Technology Officer of Intel Security’s Europe, Middle East and Africa division, 7/13/2015
Comment2 comments  |  Read  |  Post a Comment
Franchising Ransomware
Vincent Weafer, Senior Vice President, Intel Security
Ransomware-as-a-service is fueling cyberattacks. Is your organization prepared?
By Vincent Weafer Senior Vice President, Intel Security, 7/1/2015
Comment3 comments  |  Read  |  Post a Comment
Securing Critical Infrastructure
Lorie Wigle, Vice President, General Manager IOT Security Solutions, Intel Security Group
Protecting the Industrial Internet of Things from cyberthreats is a national priority.
By Lorie Wigle Vice President, General Manager IOT Security Solutions, Intel Security Group, 6/30/2015
Comment1 Comment  |  Read  |  Post a Comment
Cyber Resilience And Spear Phishing
Mo Cashman, Director of the Enterprise Architecture team at Intel Security.
Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks.
By Mo Cashman Director of the Enterprise Architecture team at Intel Security. , 6/29/2015
Comment0 comments  |  Read  |  Post a Comment
The Secret Of War Lies In The Communications --Napoleon
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
DXL helps organizations keep an eye on external and internal threats using relevant information in real time.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 6/24/2015
Comment0 comments  |  Read  |  Post a Comment
An Effective Community Is More Than Just An Online Forum
Michael Sentonas, Chief Technology and Strategy Officer, APAC
It is important to develop a strong base of contributors who can communicate effectively, answer questions, and summarize issues.
By Michael Sentonas Chief Technology and Strategy Officer, APAC, 6/19/2015
Comment0 comments  |  Read  |  Post a Comment
The Promises And Perils Of The Healthcare Internet Of Things
Lorie Wigle, Vice President, General Manager IOT Security Solutions, Intel Security Group
Connected devices are working wonders for managing treatment, but their integration with consumer technology and cloud computing raises significant security issues.
By Lorie Wigle Vice President, General Manager IOT Security Solutions, Intel Security Group, 6/11/2015
Comment2 comments  |  Read  |  Post a Comment
Beware of Emails Bearing Gifts
Michael Sentonas, Chief Technology and Strategy Officer, APAC
A security-connected framework can help your organization thwart cybercrime.
By Michael Sentonas Chief Technology and Strategy Officer, APAC, 6/9/2015
Comment1 Comment  |  Read  |  Post a Comment
Securing Private and Hybrid Clouds
Raja Patel, Vice President and General Manager of Network Security at Intel Security
As-a-service models offer huge opportunities, but also complicate security.
By Raja Patel Vice President and General Manager of Network Security at Intel Security, 6/4/2015
Comment0 comments  |  Read  |  Post a Comment
What Are You Doing During The Golden Hour After An Attack?
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
Take the time to detect the attack, isolate the infected machines, and restore them to a known state.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 5/28/2015
Comment3 comments  |  Read  |  Post a Comment
The Cloud Revolution Requires High-Performance Attack Prevention
Rees Johnson, Sr. VP and GM the Content Security Business Unit, Intel Security
Where there is traffic, there are bandits.
By Rees Johnson Sr. VP and GM the Content Security Business Unit, Intel Security, 5/20/2015
Comment0 comments  |  Read  |  Post a Comment
Teaming Up to Educate and Enable Better Defense Against Phishing
Rees Johnson, Sr. VP and GM the Content Security Business Unit, Intel Security
Companies need to both educate their employees and implement prevention technology.
By Rees Johnson Sr. VP and GM the Content Security Business Unit, Intel Security, 5/13/2015
Comment4 comments  |  Read  |  Post a Comment
Defenses Outside the Wall
Lorie Wigle, Vice President, General Manager IOT Security Solutions, Intel Security Group
Protecting the Internet of Things means protecting the privacy of customers and colleagues.
By Lorie Wigle Vice President, General Manager IOT Security Solutions, Intel Security Group, 5/4/2015
Comment5 comments  |  Read  |  Post a Comment
Application Layer Exfiltration Protection: A New Perspective on Firewalls
Pat Calhoun, Senior Vice President & General Manager, Network Security at Intel Security
Organizations must adopt a new way of thinking about safeguarding sensitive data from theft and unauthorized exfiltration.
By Pat Calhoun Senior Vice President & General Manager, Network Security at Intel Security, 4/28/2015
Comment2 comments  |  Read  |  Post a Comment
‘Golden Hour’ Incident Response Agility
Torry Campbell, Chief Technical Officer of Endpoint and Management at Intel Security
Security leaders must encourage and integrate data, processes, and controls to facilitate comprehension and investment of precious human capital in higher-level tasks.
By Torry Campbell Chief Technical Officer of Endpoint and Management at Intel Security, 4/22/2015
Comment0 comments  |  Read  |  Post a Comment
Predictive Analytics: The Future Is Now
Vincent Weafer, Senior Vice President, Intel Security
Enhanced analytical capabilities will help organizations better understand how attacks will unfold, and how to stop them in their earliest stages.
By Vincent Weafer Senior Vice President, Intel Security, 4/15/2015
Comment0 comments  |  Read  |  Post a Comment
Botnet to Cybersecurity: Catch Me If You Can
Raj Samani , Chief Technology Officer of Intel Security’s Europe, Middle East and Africa division
Tracking and disrupting the crime ring behind a polymorphic botnet.
By Raj Samani Chief Technology Officer of Intel Security’s Europe, Middle East and Africa division, 4/14/2015
Comment0 comments  |  Read  |  Post a Comment
<<   <   Page 5 / 5
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19750
PUBLISHED: 2019-12-12
minerstat msOS before 2019-10-23 does not have a unique SSH key for each instance of the product.
CVE-2019-4606
PUBLISHED: 2019-12-12
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-For...
CVE-2019-16246
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
CVE-2019-17358
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
CVE-2019-17428
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.