Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Content by DarkReadingTim

Member Since: March 12, 2014
Blog Posts: 1718
Posts: 238

posted in March 2011

19 items
Searching For Security's Yardstick
News  |  3/30/2011  | 
Despite rising threats, most security organizations still don't have clear metrics for measuring their performance -- or their enterprises' security posture
'Silos' Of Security Processes Still Not Integrated, Study Says
Quick Hits  |  3/30/2011  | 
Log management, compliance reporting, real-time monitoring, forensic investigation, and incident response still not coordinated, according to SenSage study
In Ironic Twist, MySQL's Own Database Is Hacked Via SQL Injection
News  |  3/28/2011  | 
Open-source database company's customer names, passwords revealed following database attack
Bank Of America Customers In Michigan Report Account Theft
Quick Hits  |  3/28/2011  | 
Thousands might be affected; origin of electronic theft still uncertain
ANSI And Shared Assessments Launch Study On Financial Impact Of Breached Patient Data
Quick Hits  |  3/25/2011  | 
Study could help healthcare companies justify additional security spending
Hackers Take Schools To School
Quick Hits  |  3/23/2011  | 
Nearly two-thirds of schools suffer two breaches or more per year, Panda Security study says
Has Complexity Become Security's Chief Nemesis?
News  |  3/21/2011  | 
Study says proliferation of vendors, lack of user awareness are top challenges for security pros
SIEM Market To Double By 2015, Report Says
Quick Hits  |  3/21/2011  | 
Slow-growing demand is about to get a boost, Frost & Sullivan says
Report: New Malware Increased By 26 Percent In Past Year
Quick Hits  |  3/16/2011  | 
Average of 73,000 new samples created daily in 2011, PandaLabs reports
DDoS Attacks Up 22 Percent In Second Half Of 2010, Study Says
Quick Hits  |  3/14/2011  | 
Denial-of-service has become top attack vector, according to Trustwave report
Dark Reading Launches New Tech Center On Advanced Threats
Commentary  |  3/13/2011  | 
New subsite will offer more in-depth news coverage, analysis on next-generation threats
Cost Of Data Breaches Up Again, Ponemon Study Says
News  |  3/10/2011  | 
Cost per breached record hits $214; average breach costs $7.2 million
Penn Mutual Says Employee Might Have Disclosed Customer Data
Quick Hits  |  3/9/2011  | 
Rogue worker gained unauthorized access to information, insurance firm says
Social Network Users Could Be A Click Away From Infection, Researchers Say
News  |  3/8/2011  | 
Most social nets don't screen out malware in URLs or ads, Dasient researchers find
Most Websites Vulnerable To Attack, WhiteHat Study Says
Quick Hits  |  3/8/2011  | 
Average site is exposed about 270 days of the year, according to report
Cord Blood Registry Notifies 300,000 Of Potential Data Loss
Quick Hits  |  3/4/2011  | 
Backup tapes stolen from employee's car contained unencrypted data
Search Engine Malware Doubled In 2010, Report Says
News  |  3/4/2011  | 
Spam down, Twitter crime rate up by 20 percent, according to Barracuda research
Cybercriminal Profiles Don't Always Match Perceptions, Report Says
Quick Hits  |  3/2/2011  | 
Dutch study of police data says there are many 'petty' cybercriminals who act alone
Hospital Pays $1 Million Penalty For Loss Of Patient Data
News  |  3/1/2011  | 
Mass General suffers lawsuit, heavy fine when employee leaves records on train

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-20
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
PUBLISHED: 2022-01-20
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.