Endpoint Security: Putting The Focus On What Matters
Manish Patel, Senior Product Marketing Manager, TenableCommentary
Five tips to help sift through the noise and focus on actions that can dramatically impact your endpoint security program.
By Manish Patel Senior Product Marketing Manager, Tenable, 10/29/2015
Comment1 Comment  |  Read  |  Post a Comment
Are You Making This Endpoint Security Mistake?
Manish Patel, Senior Product Marketing Manager, TenableCommentary
Detecting threats isnt enough. You must also remediate vulnerable endpoints and employ continuous monitoring to reduce exposure.
By Manish Patel Senior Product Marketing Manager, Tenable, 10/19/2015
Comment0 comments  |  Read  |  Post a Comment
Asset Segmentation: The Key To Control
Ted Gary, Product Marketing Manager, TenableCommentary
Automated asset segmentation and classification helps focus strong security controls where they are needed most.
By Ted Gary Product Marketing Manager, Tenable, 10/15/2015
Comment0 comments  |  Read  |  Post a Comment
3 Steps To Knowing Your Network
Ted Gary, Product Marketing Manager, TenableCommentary
Managing your IT assets is a daily effort requiring vigilance and persistence.
By Ted Gary Product Marketing Manager, Tenable, 9/29/2015
Comment0 comments  |  Read  |  Post a Comment
Buyer Beware: How To Avoid Getting Sucked Into Shelfware
Gavin Millard, Technical Director, EMEA, Tenable Network SecurityCommentary
Three simple questions can help ensure you get the most value out of your information security investments.
By Gavin Millard Technical Director, EMEA, Tenable Network Security, 9/22/2015
Comment0 comments  |  Read  |  Post a Comment
Why Is Endpoint Security Failing?
Manish Patel, Senior Product Marketing Manager, TenableCommentary
Endpoint security assurance is not just about detecting threats, but about building a more effective endpoint security program.
By Manish Patel Senior Product Marketing Manager, Tenable, 9/17/2015
Comment2 comments  |  Read  |  Post a Comment
Get Fit: Remove Security Weaknesses
Ted Gary, Product Marketing Manager, TenableCommentary
Preventing problems by strengthening security is often more effective and less expensive than reacting to breaches after they occur.
By Ted Gary Product Marketing Manager, Tenable, 9/10/2015
Comment0 comments  |  Read  |  Post a Comment
Your Worst Day In IT
David Spark, Veteran Tech journalist and founder of Spark Media SolutionsCommentary
Turns out the most common culprits aren't what you might think.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
Flash: Web Browser Plugins Are Vulnerable
Gavin Millard, Technical Director, EMEA, Tenable Network SecurityCommentary
Maybe its time to uninstall Flash for those that dont need it and continuously monitor those that do.
By Gavin Millard Technical Director, EMEA, Tenable Network Security, 8/27/2015
Comment1 Comment  |  Read  |  Post a Comment
How Much Threat Intelligence Is Too Much?
Steve Hall, VP of Product Marketing, Tenable Network Security, Inc.Commentary
Turn your threat data into actionable intelligence by focusing on what is relevant to you and your organization.
By Steve Hall VP of Product Marketing, Tenable Network Security, Inc., 8/20/2015
Comment0 comments  |  Read  |  Post a Comment
How Can We Work Smarter In Security?
David Spark, Veteran Tech journalist and founder of Spark Media SolutionsCommentary
Attendees at the 2015 Black Hat Conference in Las Vegas weigh in.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 8/11/2015
Comment0 comments  |  Read  |  Post a Comment
What Should the Users of Ashley Madison Do?
David Spark, Veteran Tech journalist and founder of Spark Media SolutionsCommentary
Security-minded professionals offer their advice at Black Hat party.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 8/6/2015
Comment2 comments  |  Read  |  Post a Comment
What 30 Classic Games Can Teach Us about Security
David Spark, Veteran Tech journalist and founder of Spark Media SolutionsCommentary
Information security experts share their thoughts on how participating in games and sports helped hone their professional skills.
By David Spark Veteran Tech journalist and founder of Spark Media Solutions, 7/28/2015
Comment3 comments  |  Read  |  Post a Comment
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Risk, Privacy, and Information Security Officer, AvePoint, Inc.,  8/20/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Its family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable identifies all types of risk on the network — including missing patches, malware and intruders, missing configurations and missing monitoring — so customers can make informed decisions about where they are exposed. Its products reach across cloud, virtual, mobile and traditional IT systems and measure attack vectors in each of these domains. Tenable’s continuous network monitoring solution measures organizations’ compliance in real-time. This ensures that gaps in security coverage and lapses in security programs get detected and prioritized immediately. Tenable is relied upon by many of the world’s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense.
Featured Writers
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-17305
PUBLISHED: 2018-08-21
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a Bleichenbacher Oracle vulnerability in the IPSEC IKEv1 implementations. Remote attackers can decrypt IPSEC tunnel ciphertext data by leveraging a Bleichenbacher R...
CVE-2017-17311
PUBLISHED: 2018-08-21
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a DoS vulnerability in the IPSEC IKEv1 implementations of Huawei Firewall products. Due to improper handling of the malformed messages, an attacker may sent crafted...
CVE-2017-17312
PUBLISHED: 2018-08-21
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a DoS vulnerability in the IPSEC IKEv1 implementations of Huawei Firewall products. Due to improper handling of the malformed messages, an attacker may sent crafted...
CVE-2018-12115
PUBLISHED: 2018-08-21
In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second...
CVE-2018-7166
PUBLISHED: 2018-08-21
In all versions of Node.js 10 prior to 10.9.0, an argument processing flaw can cause `Buffer.alloc()` to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying `encoding` can be passed as a number, this is misint...