Operations
News & Commentary
Cybersecurity Firm root9B's Assets Up for Sale
Jai Vijayan, Freelance writerNews
Move to foreclose comes after company defaulted on repayment terms for over $10.7 millions in loans it owes creditors.
By Jai Vijayan Freelance writer, 8/21/2017
Comment0 comments  |  Read  |  Post a Comment
Critical Infrastructure, Cybersecurity & the 'Devils Rope'
David Zahn, General Manager of Cybersecurity at PASCommentary
How hackers today are engaging in a modern 'Fence Cutter War' against industrial control systems, and what security professionals need to do about it.
By David Zahn General Manager of Cybersecurity at PAS, 8/17/2017
Comment1 Comment  |  Read  |  Post a Comment
The Day of Reckoning: Cybercrimes Impact on Brand
Tom Kellermann,  CEO & Cofounder, Strategic Cyber Ventures Commentary
Why the security industry needs to invest in architecture that defends against reputational damage as well as other, more traditional threats.
By Tom Kellermann CEO & Cofounder, Strategic Cyber Ventures , 8/16/2017
Comment0 comments  |  Read  |  Post a Comment
20 Tactical Questions SMB Security Teams Should Ask Themselves
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRACommentary
Or why it pays for small- and medium-sized businesses to plan strategically but act tactically.
By Joshua Goldfarb Co-founder & Chief Product Officer, IDDRA, 8/15/2017
Comment2 comments  |  Read  |  Post a Comment
IoT Medical Devices a Major Security Worry in Healthcare, Survey Shows
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Healthcare providers, manufacturers, and regulators say cybersecurity risks of IoT medical devices and connected legacy systems a top concern.
By Dawn Kawamoto Associate Editor, Dark Reading, 8/15/2017
Comment0 comments  |  Read  |  Post a Comment
6 Ways CISOs Can Play a Role in Selling Security
Raymond Pompon, Principal Threat Research Evangelist at F5 Networks
When customers ask tough questions about data security, business service resilience, privacy, regulatory, and reputational risk its best to remain upbeat and positive. Heres how.
By Raymond Pompon Principal Threat Research Evangelist at F5 Networks, 8/10/2017
Comment0 comments  |  Read  |  Post a Comment
Risky Business: Why Enterprises Cant Abdicate Cloud Security
John Moynihan, President, Minuteman GovernanceCommentary
It's imperative for public and private sector organizations to recognize the essential truth that governance of data entrusted to them cannot be relinquished, regardless of where the data is maintained.
By John Moynihan President, Minuteman Governance, 8/7/2017
Comment1 Comment  |  Read  |  Post a Comment
Making Infosec Meetings More Inclusive
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Diversity and inclusion experts explain how to avoid meeting pitfalls that preclude the voices of underrepresented members of the team.
By Dawn Kawamoto Associate Editor, Dark Reading, 8/3/2017
Comment0 comments  |  Read  |  Post a Comment
Why Cybersecurity Needs a Human in the Loop
John Bruce, CEO and Co-Founder of IBM ReslientCommentary
It's no longer comparable to Kasparov versus Deep Blue. When security teams use AI, it's like Kasparov consulting with Deep Blue before deciding on his next move.
By John Bruce CEO and Co-Founder of IBM Reslient, 8/3/2017
Comment2 comments  |  Read  |  Post a Comment
72% of Businesses Plan for Endpoint Security Budget Boost
Kelly Sheridan, Associate Editor, Dark ReadingNews
For a full third of organizations investing more in endpoint security there will be a "substantial" increase in spending.
By Kelly Sheridan Associate Editor, Dark Reading, 8/2/2017
Comment0 comments  |  Read  |  Post a Comment
Staying in Front of Cybersecurity Innovation
Rinki Sethi, Senior Director of Security Operations and Strategy of  Palo Alto NetworksCommentary
Innovation is challenging for security teams because it encompasses two seemingly contradictory ideas: it's happening too slowly and too quickly.
By Rinki Sethi Senior Director of Security Operations and Strategy of Palo Alto Networks, 8/2/2017
Comment1 Comment  |  Read  |  Post a Comment
The Right to Be Forgotten & the New Era of Personal Data Rights
Dimitri Sirota, Founder & CEO of BigIDCommentary
Because of the European Union's GDPR and other pending legislation, companies must become more transparent in how they protect their customers' data.
By Dimitri Sirota Founder & CEO of BigID, 7/27/2017
Comment1 Comment  |  Read  |  Post a Comment
The Wild West of Security Post-Secondary Education
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat researchers will show how inconsistent security schooling is at the university level.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/26/2017
Comment1 Comment  |  Read  |  Post a Comment
10 Critical Steps to Create a Culture of Cybersecurity
Edward J. McAndrew, Partner & Co-Chair, Privacy & Data Security  Group, Ballard Spahr LLP, Faculty Member of the Compliance, Governance &  Oversight CouncilCommentary
Businesses are more vulnerable than they need to be. Here's what you should do about it.
By Edward J. McAndrew Partner & Co-Chair, Privacy & Data Security Group, Ballard Spahr LLP, Faculty Member of the Compliance, Governance & Oversight Council, 7/26/2017
Comment2 comments  |  Read  |  Post a Comment
How 'Postcript' Exploits Networked Printers
Dawn Kawamoto, Associate Editor, Dark ReadingNews
At Black Hat 2017, a university researcher will demo how attackers can drill into networked printers by way of the ubiquitous PostScript programming language.
By Dawn Kawamoto Associate Editor, Dark Reading, 7/25/2017
Comment0 comments  |  Read  |  Post a Comment
How Women Can Raise Their Profile within the Cybersecurity Industry
Jodie Nel, Event Organizer, Cyber Security Event SeriesCommentary
Closing the cybersecurity gender gap won't happen overnight, but women can take can take steps to begin leveling the playing field.
By Jodie Nel Event Organizer, Cyber Security Event Series, 7/25/2017
Comment1 Comment  |  Read  |  Post a Comment
7 Hardware & Firmware Hacks Highlighted at Black Hat 2017
Ericka Chickowski, Contributing Writer, Dark Reading
Researchers will hammer home potentially devastating attacks, and demo a range of vulnerabilities, techniques and tools.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/24/2017
Comment0 comments  |  Read  |  Post a Comment
Majority of Security Pros Let Productivity Trump Security
Dawn Kawamoto, Associate Editor, Dark ReadingNews
A survey found that 64% of IT security professionals will tweak security to give workers more flexibility to be productive when asked to make that move by top executives.
By Dawn Kawamoto Associate Editor, Dark Reading, 7/24/2017
Comment8 comments  |  Read  |  Post a Comment
DevOps & Security: Butting Heads for Years but Integration is Happening
Zeus Kerravala, Founder and Principal Analyst, ZK ResearchCommentary
A combination of culture change, automation, tools and processes can bring security into the modern world where it can be as agile as other parts of IT.
By Zeus Kerravala Founder and Principal Analyst, ZK Research, 7/20/2017
Comment7 comments  |  Read  |  Post a Comment
98% of Companies Favor Integrating Security with DevOps
Dawn Kawamoto, Associate Editor, Dark ReadingNews
A majority of companies are either planning or have launched an integrated DevOps and security team, a new report shows.
By Dawn Kawamoto Associate Editor, Dark Reading, 7/19/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by salynage
Current Conversations really its good
In reply to: Re: Pending Review
Post Your Own Reply
Posted by recomasa
Current Conversations thank you 
In reply to: thanks
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.