Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

News & Commentary
Cybersecurity in the Biden Administration: Experts Weigh In
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security pros and former government employees share their expectations and concerns for the new administration and their hope for a "return to normal."
By Kelly Sheridan Staff Editor, Dark Reading, 12/2/2020
Comment0 comments  |  Read  |  Post a Comment
Ivanti Acquires MobileIron & Pulse Secure
Dark Reading Staff, Quick Hits
The company plans to use these acquisitions to strengthen and secure IT connections across remote devices and infrastructure.
By Dark Reading Staff , 12/1/2020
Comment0 comments  |  Read  |  Post a Comment
Do You Know Who's Lurking in Your Cloud Environment?
Kelly Sheridan, Staff Editor, Dark ReadingNews
A security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.
By Kelly Sheridan Staff Editor, Dark Reading, 11/25/2020
Comment0 comments  |  Read  |  Post a Comment
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark ReadingNews
The startup, founded by former white-hat hackers, has secured a $4 million seed round to close security gaps in cloud environments.
By Kelly Sheridan Staff Editor, Dark Reading, 11/24/2020
Comment0 comments  |  Read  |  Post a Comment
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Verisign's R&D team has developed new ways to authenticate and optimize DNS traffic on the client side of the domain-name resolution process.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 11/19/2020
Comment2 comments  |  Read  |  Post a Comment
Out With the Old Perimeter, in With the New Perimeters
Charlie Winckless, Senior Director, Cybersecurity Solutions, at PresidioCommentary
A confluence of trends and events has exploded the whole idea of "the perimeter." Now there are many perimeters, and businesses must adjust accordingly.
By Charlie Winckless Senior Director, Cybersecurity Solutions, at Presidio, 11/18/2020
Comment0 comments  |  Read  |  Post a Comment
Breakdown of a Break-in: A Manufacturer's Ransomware Response
Kelly Sheridan, Staff Editor, Dark ReadingNews
The analysis of an industrial ransomware attack reveals common tactics and proactive steps that businesses can take to avoid similar incidents.
By Kelly Sheridan Staff Editor, Dark Reading, 11/16/2020
Comment1 Comment  |  Read  |  Post a Comment
Global Pandemic Fuels Cyber-Threat Workload for National Cyber Security Centre, Shows Annual Review
IFSEC Global, StaffNews
From securing the Nightingale hospitals to tackling threats to vaccine research and production, a large part of the National Cyber Security Centre's (NCSC) recent work in the UK has been related to the coronavirus pandemic, as Ron Alalouff discovered when reporting on its Annual Review.
By Ron Alalouff, Freelance Journalist , 11/16/2020
Comment0 comments  |  Read  |  Post a Comment
A Call for Change in Physical Security
Fred Burton, Executive Director, Ontic Center for Protective IntelligenceCommentary
We're at an inflection point. The threats we face are dynamic, emerging, and global. Are you ready?
By Fred Burton Executive Director, Ontic Center for Protective Intelligence, 11/16/2020
Comment1 Comment  |  Read  |  Post a Comment
The Sameness of Every Day: How to Change Up Audit Fatigue
Stephen Horvath, Vice President, Strategy & Cloud, at Telos CorporationCommentary
And with more data compliance laws on the way, audit fatigue could be a real challenge for infosec professionals.
By Stephen Horvath Vice President, Strategy & Cloud, at Telos Corporation, 11/13/2020
Comment0 comments  |  Read  |  Post a Comment
7 Cool Cyberattack and Audit Tools to be Highlighted at Black Hat Europe
Ericka Chickowski, Contributing Writer
Platforms, open source tools, and other toolkits for penetration testers and other security practitioners will be showcased at the early December virtual event.
By Ericka Chickowski Contributing Writer, 11/12/2020
Comment0 comments  |  Read  |  Post a Comment
Security Hiring Plans Remain Constant Despite Pandemic
Kelly Sheridan, Staff Editor, Dark ReadingNews
Although we saw workforce gains this year, 56% of businesses surveyed report staff shortages are putting their organization at risk.
By Kelly Sheridan Staff Editor, Dark Reading, 11/11/2020
Comment0 comments  |  Read  |  Post a Comment
3 Tips For Successfully Running Tech Outside the IT Department
Patrick Kehoe, Chief Marketing and Strategy Officer, CoalfireCommentary
When marketing opts for "extra-departmental IT," coordination and communication are required to keep things secured.
By Patrick Kehoe Chief Marketing and Strategy Officer, Coalfire, 11/11/2020
Comment0 comments  |  Read  |  Post a Comment
Barracuda to Acquire Fyde for Zero-Trust Capabilities
Dark Reading Staff, Quick Hits
Plans call for expanding the Barracuda CloudGen SASE platform.
By Dark Reading Staff , 11/11/2020
Comment0 comments  |  Read  |  Post a Comment
Cloud Usage, Biometrics Surge As Remote Work Grows Permanent
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new report reveals organizations are increasing their adoption of biometric authentication and disallowing SMS as a login method.
By Kelly Sheridan Staff Editor, Dark Reading, 11/10/2020
Comment0 comments  |  Read  |  Post a Comment
Overlooked Security Risks of the M&A Rebound
Bill Ruckelshaus, CFO, ExtraHopCommentary
Successful technology integration, post-merger, is tricky in any market, and never more so than with today's remote work environments and distributed IT infrastructure.
By Bill Ruckelshaus CFO, ExtraHop, 11/10/2020
Comment0 comments  |  Read  |  Post a Comment
Preventing and Mitigating DDoS Attacks: It's Elementary
Barrett Lyon, Co-Founder & CEO, NetographyCommentary
Following a spate of cyberattacks nationwide, school IT teams need to act now to ensure their security solution makes the grade.
By Barrett Lyon Co-Founder & CEO, Netography, 11/9/2020
Comment0 comments  |  Read  |  Post a Comment
CSA Moves to Redefine Cloud-Based Intelligence
Paul Kurtz, Executive Chairman and Co-founder of TruSTARCommentary
The new paradigm seeks to understand, integrate, and automate data workflows, and better yet, doesn't require significant investment or more personnel.
By Paul Kurtz Executive Chairman and Co-founder of TruSTAR, 11/4/2020
Comment0 comments  |  Read  |  Post a Comment
Neustar Agrees to Buy Verisign's Public DNS Service
Dark Reading Staff, Quick Hits
The address space for Verisign Public DNS will be incorporated into Neustar's UltraDNS Public service following the acquisition.
By Dark Reading Staff , 11/3/2020
Comment0 comments  |  Read  |  Post a Comment
Oracle Issues Out-of-Band Update for Remote-Access Vulnerability
Dark Reading Staff, Quick Hits
The exploit could give an attacker complete control of vulnerable WebLogic servers.
By Dark Reading Staff , 11/3/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by JohnHammond
Current Conversations Nice article!
In reply to: Great!
Post Your Own Reply
Posted by TimKorry
Current Conversations Great tips. Thanks
In reply to: Great tips
Post Your Own Reply
More Conversations
PR Newswire
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23727
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in the Antiy Zhijia Terminal Defense System 5.0.2.10121559 and an attacker can cause a computer crash (BSOD).
CVE-2020-28175
PUBLISHED: 2020-12-03
There is a local privilege escalation vulnerability in Alfredo Milani Comparetti SpeedFan 4.52. Attackers can use constructed programs to increase user privileges
CVE-2020-13524
PUBLISHED: 2020-12-03
An out-of-bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 uses SPECS data from binary USD files. A specially crafted malformed file can trigger an out-of-bounds memory access and modification which results in memory corruption. To trigger this vulnerability, the victim n...
CVE-2020-13525
PUBLISHED: 2020-12-03
The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2020-23726
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in Wise Care 365 5.5.4, attackers can cause computer crash (BSOD).