Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Breaking The Security Fail Cycle
Newest First  |  Oldest First  |  Threaded View
aziza bond
50%
50%
aziza bond,
User Rank: Apprentice
5/4/2015 | 1:52:49 PM
Re: Simplify, rethink, simplify, rethink
You are totally true , there is a difference there
macker490
100%
0%
macker490,
User Rank: Ninja
5/3/2015 | 7:25:07 AM
Re: Simplify, rethink, simplify, rethink
there is a fundamental difference between an old "dumb head" terminal like a VT-100 or a 3270 -- and a PC: the PC can have multiple applications open at the same time -- AND -- the PC User's credentials apply to all the open apps.   this is wrong from the get-go and promotes leakage of secure data between apps: while memory may be protected: file systems are not.   this may be rectified by using NAMED SPACES so that application programs do NOT have free run of all the data resources on the user workstation combined with free use of the user's credentials.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
5/1/2015 | 12:45:02 AM
"Stop Doing"
A kernel of wisdom in this article notes "the question you should always ask is 'What is this going to help let me stop doing?'"  That is because every security solution "is an addition, but never a subtraction."

It is always amazing to me the amount of overhead on man hours applications specially designed to "help" the Enterprise actually ingest.  In particular, security software (of which I've had the pleasure of managing two, so I know from experience) seems to take the cake.  

Being able to assess an application, the time it will require to implement and whether its features once live will save or incur time cost is a great skill and an important part of procurement. 

 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
4/30/2015 | 11:32:29 PM
Simplify, simplify, simplify
Security simplification may indeed be the most important InfoSec step we can take -- across the board.  Most security mishaps, I daresay, happen because of laziness and/or an overpermissiveness so as to not compromise accessibility and functionality (security's mortal foes).  The less conflict security innovations can present between security and accessibility, the more security we can expect to see.


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-19274
PUBLISHED: 2021-05-12
A Cross SIte Scripting (XSS) vulnerability exists in Dhcms 2017-09-18 in guestbook via the message board, which could let a remote malicious user execute arbitrary code.
CVE-2021-30211
PUBLISHED: 2021-05-12
Knowage Suite 7.3 is vulnerable to Stored Cross-Site Scripting (XSS). An attacker can inject arbitrary web script in '/knowage/restful-services/signup/update' via the 'surname' parameter.
CVE-2021-30212
PUBLISHED: 2021-05-12
Knowage Suite 7.3 is vulnerable to Stored Cross-Site Scripting (XSS). An attacker can inject arbitrary web script in '/knowage/restful-services/documentnotes/saveNote' via the 'nota' parameter.
CVE-2021-30213
PUBLISHED: 2021-05-12
Knowage Suite 7.3 is vulnerable to unauthenticated reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter.
CVE-2021-30214
PUBLISHED: 2021-05-12
Knowage Suite 7.3 is vulnerable to Stored Client-Side Template Injection in '/knowage/restful-services/signup/update' via the 'name' parameter.