Endpoint

10/30/2017
04:00 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Security Gets Social: 10 of Dark Reading's Most Shared Stories

We scared up our most popular stories on Facebook, Twitter, and LinkedIn.
Previous
1 of 11
Next

(Image: Twin Design via Shutterstock)

(Image: Twin Design via Shutterstock)

When you want to spread interesting content around the Internet, where do you share? Based on our numbers, it looks like you're most active on LinkedIn - but Facebook is a close second. And if you don't use Google Plus, you're not alone. Not many people do.

We pulled data from the last three months to get a better sense of which Dark Reading stories are most frequently shared online and which social platforms are most commonly used among our readers. What we found were some exciting nuggets of data about how often stories are published, and an interesting throwback to news reports from this summer and fall.

Some of the most commonly shared articles related to topics keeping CISOs awake at night: malware-less attacks, the skills gap, insider threats, and data breaches. Some related to major cyberattacks from this year. One included parallels between cybersecurity and Game of Thrones.

Here, we share some of our social data with you. These ten articles were the most frequently shared on Facebook, Twitter, and LinkedIn during the months of August, September, and October 2017.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14072
PUBLISHED: 2018-07-15
libsixel 1.8.1 has a memory leak in sixel_decoder_decode in decoder.c, image_buffer_resize in fromsixel.c, and sixel_decode_raw in fromsixel.c.
CVE-2018-14073
PUBLISHED: 2018-07-15
libsixel 1.8.1 has a memory leak in sixel_allocator_new in allocator.c.
CVE-2018-14068
PUBLISHED: 2018-07-15
An issue was discovered in SRCMS V2.3.1. There is a CSRF vulnerability that can add an admin account via admin.php?m=Admin&c=manager&a=add.
CVE-2018-14069
PUBLISHED: 2018-07-15
An issue was discovered in SRCMS V2.3.1. There is a CSRF vulnerability that can add a user account via admin.php?m=Admin&c=member&a=add.
CVE-2018-14066
PUBLISHED: 2018-07-15
The content://wappush content provider in com.android.provider.telephony, as found in some custom ROMs for Android phones, allows SQL injection. One consequence is that an application without the READ_SMS permission can read SMS messages. This affects Infinix X571 phones, as well as various Lenovo p...