Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/3/2017
10:30 AM
Marilyn Cohodas
Marilyn Cohodas
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Russian Election-Tampering & Enterprise Security Plans

Take our new flash poll and tells us if the current political climate is making you rethink disaster recovery and business continuity planning.

Whether you are appalled, disturbed, or unfazed by the controversy over the claims of Russian interference in the 2016 US Presidential election, the barrage of headlines continuing today are a constant reminder of the threats facing our nation's governmental systems and private industry from nation-state hackers that aim to do us harm.

Last month, the Trump administration announced a plan to establish a new cybersecurity strategy derived from an Executive Order signed by the president in May. We want to hear readers' views on whether the current US political climate is causing your organizations to make infosecurity-related changes to disaster recovery or business continuity plans? Your choices in our new Political Climate Change poll include:

  • Yes
  • No
  • No, but we are considering it
  • Still waiting for cybersecurity guidance from the Trump admin EO
  • Other (Please explain in the comments)

If you have other points of view, we encourage you to share them in the comments so that others can weigh in. Click here to take the flash poll and join the conversation.

Related Content:

 

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
6 Small-Business Password Managers
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/8/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4652
PUBLISHED: 2019-11-12
IBM Spectrum Protect Plus 10.1.0 through 10.1.4 uses insecure file permissions on restored files and directories in Windows which could allow a local user to obtain sensitive information or perform unauthorized actions. IBM X-Force ID: 170963.
CVE-2011-3618
PUBLISHED: 2019-11-12
atop: symlink attack possible due to insecure tempfile handling
CVE-2012-1109
PUBLISHED: 2019-11-12
mwlib 0.13 through 0.13.4 has a denial of service vulnerability when parsing #iferror magic functions
CVE-2019-18848
PUBLISHED: 2019-11-12
The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.
CVE-2011-5271
PUBLISHED: 2019-11-12
Pacemaker before 1.1.6 configure script creates temporary files insecurely