Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Breaking The Security Fail Cycle
Newest First  |  Oldest First  |  Threaded View
aziza bond
aziza bond,
User Rank: Apprentice
5/4/2015 | 1:52:49 PM
Re: Simplify, rethink, simplify, rethink
You are totally true , there is a difference there
User Rank: Ninja
5/3/2015 | 7:25:07 AM
Re: Simplify, rethink, simplify, rethink
there is a fundamental difference between an old "dumb head" terminal like a VT-100 or a 3270 -- and a PC: the PC can have multiple applications open at the same time -- AND -- the PC User's credentials apply to all the open apps.   this is wrong from the get-go and promotes leakage of secure data between apps: while memory may be protected: file systems are not.   this may be rectified by using NAMED SPACES so that application programs do NOT have free run of all the data resources on the user workstation combined with free use of the user's credentials.
User Rank: Ninja
5/1/2015 | 12:45:02 AM
"Stop Doing"
A kernel of wisdom in this article notes "the question you should always ask is 'What is this going to help let me stop doing?'"  That is because every security solution "is an addition, but never a subtraction."

It is always amazing to me the amount of overhead on man hours applications specially designed to "help" the Enterprise actually ingest.  In particular, security software (of which I've had the pleasure of managing two, so I know from experience) seems to take the cake.  

Being able to assess an application, the time it will require to implement and whether its features once live will save or incur time cost is a great skill and an important part of procurement. 

Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
4/30/2015 | 11:32:29 PM
Simplify, simplify, simplify
Security simplification may indeed be the most important InfoSec step we can take -- across the board.  Most security mishaps, I daresay, happen because of laziness and/or an overpermissiveness so as to not compromise accessibility and functionality (security's mortal foes).  The less conflict security innovations can present between security and accessibility, the more security we can expect to see.

7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-10
JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are m...
PUBLISHED: 2021-05-10
Cross Site Scripting (XSS) in Hotels_Server v1.0 allows remote attackers to execute arbitrary code by injecting crafted commands the data fields in the component "/controller/publishHotel.php".
PUBLISHED: 2021-05-10
An exploitable SQL injection vulnerability exists in ‘manageServiceStocks.jsp’ page of OpenClinic GA 5.173.3. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
PUBLISHED: 2021-05-10
An out-of-bounds write vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
PUBLISHED: 2021-05-10
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vu...