Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

2/13/2012
04:16 PM
50%
50%

RSA Conference 2012: Complete Coverage

A round-up of articles leading up to and live coverage from RSA Conference 2012, Feb. 27 - March 2, San Francisco

RSA Conference 2012 Logo

>> Getting A Good Metrics Program Off The Ground
Metrics experts say that motivating a company with data requires getting away from the planning and collecting the information as soon as possible

>> A Case Study In Security Big Data Analysis
At the RSA Conference, Zions Bancorporation showed how Hadoop and BI analytics can power better security intelligence

>> Mobile's Cryptography Conundrums
Two RSA presentations -- one by NSA and one by Cryptography Research experts -- show lack of maturity in mobile ecosystem

>> Don't Let Data Drive Your Compliance Efforts
Compliance continues to be a driver for many security programs, but not necessarily for the right reason, says former NSA analyst and current Accuvant GRC guru Doug Landoll in an interview at the RSA Conference

>> Microsoft Studies 10 Years Of Malware And Threats
Special report maps malware evolution, and how the least-infected regions keep botnets, other threats at bay

>> Solving The SSL Certificate-Revocation Checking Shortfall
Just weeks after Google turned off revocation checking in Chrome, browser vendors convene at RSA to discuss some solutions to a broken system

>> NSA Wants More Involvement In Networks Of Businesses
Meanwhile, DHS officials say they're the ones who should be leading the cybersecurity charge

>> NSA Wants More Involvement In Networks Of Businesses
Meanwhile, DHS officials say they're the ones who should be leading the cybersecurity charge

>> Fixing Vulnerabilities On A Shoestring
A study of 15 vulnerability remediation projects finds only a third of time is actually spent fixing flaws. More on the costs and how to reduce them

>> Qualys' Courtot Backs Trustworthy Internet Movement
Firm's CEO pumps half a million dollars into a non-profit collaborative group designed to acchttps://cm001.cmpnet.com/iw-cc/command/iw.group.formspub.save_valid_formelerate progress on Internet security’s tough problems

>> FBI Director Urges Attack Intelligence-Sharing Between Companies And The Bureau
Teamwork in fighting cybercrime is the way "to stop the bleeding," Robert Mueller tells RSA Conference attendees

>> Cybercriminal By Day, Cyber Spy By Night?
New research shows a link between espionage malware and Black Hat SEO -- and with the RSA attackers

>> Anonymous Knocks Interpol Offline With DDoS
Group retaliates following arrests of 25 alleged Anonymous associates

>> Tracking Down Advanced Threats In Your Network
If you had an advanced attacker in your network, would your security team know it? At the RSA Conference, HBGary's Greg Hoglund shared four ways to defend against pernicious attacks

>> Report Offers Insight Into Anonymous' M.O.
Research presented before RSA reveals hacktivist collective's specific strategies, tools, and tactics

>> Can Cisco Deliver On Security Strategy?
New leadership makes promises, but some pundits remain skeptical

>> New Verizon Breach Data Shows Outside Threat Dominated 2011
Preview of Verizon Business' data breach cases shows malware and hacking the top breach methods

>> Startup Targets The Attackers Behind The APT
Former McAfee execs in new stealth venture will demonstrate an APT-type targeted attack against a smartphone at RSA Conference

>> RSA: Top-Level Execs Not On Top Of Risk Management
New RSA-Carnegie Mellon CyLab survey finds most Fortune 2000 execs have little to do with their firms' security and privacy policies

>> Cloud's Future Security Depends On Mobile
Passwords are a major weakness for cloud providers. Industry experts say that, in the future, mobile will be the authentication platform of choice

>> BLOG: RSA Conference, One Year Later
How I hope history has reshaped this year's RSA Conference one year after one of the most significant breaches in the past decade

>> Don't Be Fooled By Buzzwords, Flash, And Empty Promises
Heading to San Francisco for RSA, BSides and AGC? Make sure you know how to navigate the vendor gauntlet

>> RSA Conference To Spotlight Mobile Security
This year's conference will delve into the world of mobile security, from malware to management

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9351
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. If an unauthenticated attacker makes a POST request to /tools/developerConsoleOperations.jsp or /isomorphic/IDACall with malformed XML data in the _transaction parameter, the server replies with a verbose error showing where the application resides (the a...
CVE-2020-9352
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter.
CVE-2020-9353
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) loadFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL is affected by unauthenticated Local File Inclusion via directory-traversal sequences in the elem XML ...
CVE-2020-9354
PUBLISHED: 2020-02-23
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. pat...
CVE-2020-9355
PUBLISHED: 2020-02-23
danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled.