Operations // Identity & Access Management
News & Commentary
WannaCry? Youre Not Alone: The 5 Stages of Security Grief
Eric Thomas, Director of Solutions Architecture, ExtraHopCommentary
As breach after breach hits the news, security professionals cope with the classic experiences of denial, anger, bargaining, depression, and acceptance.
By Eric Thomas Director of Solutions Architecture, ExtraHop, 6/22/2017
Comment9 comments  |  Read  |  Post a Comment
Microsoft, Accenture Team up on Blockchain for Digital ID Network
Dark Reading Staff, Quick Hits
Microsoft and Accenture use blockchain tech to build a digital ID network, which will help give legal identification to 1.1 billion people without official documents.
By Dark Reading Staff , 6/19/2017
Comment0 comments  |  Read  |  Post a Comment
Climbing the Security Maturity Ladder in Cloud
Daniel Mellen, Accenture Managing Director, SecurityCommentary
These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads.
By Daniel Mellen Accenture Managing Director, Security, 6/15/2017
Comment0 comments  |  Read  |  Post a Comment
Why Compromised Identities Are ITs Fault
Saryu Nayyar, CEO, GuruculCommentary
The eternal battle between IT and security is the source of the problem.
By Saryu Nayyar CEO, Gurucul, 6/7/2017
Comment2 comments  |  Read  |  Post a Comment
Securely Managing Employee Turnover: 3 Tips
Greg Kushto, Senior Director of Security & Solutions Engineering at Force 3Commentary
Don't let the process spiral into organizational chaos. Here are steps you can take to keep your company safe.
By Greg Kushto Senior Director of Security & Solutions Engineering at Force 3, 6/5/2017
Comment1 Comment  |  Read  |  Post a Comment
DNS Is Still the Achilles Heel of the Internet
Raymond Pompon, Principal Threat Research Evangelist at F5 Networks
Domain Name Services is too important to do without, so we better make sure its reliable and incorruptible
By Raymond Pompon Principal Threat Research Evangelist at F5 Networks, 6/1/2017
Comment0 comments  |  Read  |  Post a Comment
The Case for Disclosing Insider Breaches
Danielle Jackson, Chief Information Security Officer, SecureAuthCommentary
Too often organizations try to sweep intentional, accidental or negligent employee theft of data under the rug. Heres why they shouldnt.
By Danielle Jackson Chief Information Security Officer, SecureAuth, 5/31/2017
Comment0 comments  |  Read  |  Post a Comment
You Have One Year to Make GDPR Your Biggest Security Victory Ever
Sara Peters, Senior Editor at Dark ReadingNews
The EU's new razor-toothed data privacy law could either rip you apart or help you create the best security program you've ever had. Here's how.
By Sara Peters Senior Editor at Dark Reading, 5/25/2017
Comment14 comments  |  Read  |  Post a Comment
Going Beyond Checkbox Security
Dark Reading, CommentaryVideo
Terry Barbounis, cybersecurity evangelist for CenturyLink, stops by the InformationWeek News Desk.
By Dark Reading , 5/24/2017
Comment0 comments  |  Read  |  Post a Comment
Data Security & Privacy: The Risks of Not Playing by the Rules
Peter Merkulov, VP, Product Strategy & Technology AlliancesCommentary
Achieving compliance is a complex and challenging process. But with the right systems and policies, you can stay ahead of the next data breach and the regulators.
By Peter Merkulov VP, Product Strategy & Technology Alliances, 5/24/2017
Comment1 Comment  |  Read  |  Post a Comment
In Search of an Rx for Enterprise Security Fatigue
Rick Orloff, VP, Chief Security Officer, and Chief Privacy Officer at Code42Commentary
Are you exhausted by the vast number of measures your organization needs to keep its systems and data safe? You're not alone.
By Rick Orloff VP, Chief Security Officer, and Chief Privacy Officer at Code42, 5/22/2017
Comment0 comments  |  Read  |  Post a Comment
Deconstructing the 2016 Yahoo Security Breach
Jacob Olcott, VP, Strategic Partnerships, BitSightCommentary
One good thing about disasters is that we can learn from them and avoid repeating the same mistakes. Here are five lessons that the Yahoo breach should have taught us.
By Jacob Olcott VP, Strategic Partnerships, BitSight, 5/19/2017
Comment0 comments  |  Read  |  Post a Comment
The Fundamental Flaw in TCP/IP: Connecting Everything
Jeff Hussey, President & CEO, Tempered NetworksCommentary
Almost 30 years after its inception, it's time to fix the engine that both fuels the modern day Internet and is the root cause of its most vexing security challenges.
By Jeff Hussey President & CEO, Tempered Networks, 5/17/2017
Comment4 comments  |  Read  |  Post a Comment
Your Grandma Could Be the Next Ransomware Millionaire
Brian Vecci, Technical Evangelist, Varonis SystemsCommentary
Today's as-a-service technology has democratized ransomware, offering practically anyone with a computer and an Internet connection an easy way to get in on the game.
By Brian Vecci Technical Evangelist, Varonis Systems, 5/15/2017
Comment3 comments  |  Read  |  Post a Comment
Shining a Light on Securitys Grey Areas: Process, People, Technology
John Brenberg, Information Security & Compliance Manager, 3MCommentary
The changing distributed and mobile business landscape brings with it new security and privacy risks. Heres how to meet the challenge.
By John Brenberg Information Security & Compliance Manager, 3M, 5/9/2017
Comment0 comments  |  Read  |  Post a Comment
Backdoors: When Good Intentions Go Bad
Randy Battat Founder President & CEO PreVeil & Sanjeev Verma Founder & Chairman PreVeil, Randy Battat Founder President & CEO PreVeil & Sanjeev Verma Founder & Chairman PreVeilCommentary
Requiring encrypted applications to provide backdoors for law enforcement will weaken security for everyone.
By Randy Battat Founder President & CEO PreVeil & Sanjeev Verma Founder & Chairman PreVeil Randy Battat Founder President & CEO PreVeil & Sanjeev Verma Founder & Chairman PreVeil, 5/5/2017
Comment1 Comment  |  Read  |  Post a Comment
Why OAuth Phishing Poses A New Threat to Users
Greg Martin, CEO of JASKCommentary
Credential phishing lets attackers gain back-end access to email accounts, and yesterday's Google Docs scam raises the risk to a new level.
By Greg Martin CEO of JASK, 5/4/2017
Comment1 Comment  |  Read  |  Post a Comment
Google Docs Phishing Attack Abuses Legitimate Third-Party Sharing
Dark Reading Staff, Quick Hits
Phishing messages appear nearly identical to legitimate requests to share Google documents, because in many ways, they are.
By Dark Reading Staff , 5/3/2017
Comment0 comments  |  Read  |  Post a Comment
Users Overshare Sensitive Enterprise Data
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Survey finds nearly half of the employees trained to protect sensitive data engage in risky security practices.
By Dawn Kawamoto Associate Editor, Dark Reading, 4/20/2017
Comment0 comments  |  Read  |  Post a Comment
Google Won't Trust Symantec and Neither Should You
Mike Baukes, Co-Founder & Co-CEO, UpGuardCommentary
As bad as this controversy is for Symantec, the real damage will befall the company and individual web sites deemed untrustworthy by a Chrome browser on the basis of a rejected Symantec certificate.
By Mike Baukes Co-Founder & Co-CEO, UpGuard, 4/19/2017
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by clone13
Current Conversations just wondering...Thanx
In reply to: so who won?
Post Your Own Reply
Posted by robert.hoisington
Current Conversations ... yeah - this is just the free tier....
In reply to: UaaS?
Post Your Own Reply
More Conversations
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.