An Industry In Transition: Key Tech Trends In 2018
Shehzad Merchant, Chief Technology Officer, GigamonCommentary
Get Smart About Network Segmentation & Traffic Routing
Jack Hamm, Sr. Manager, Security Operations, GigamonCommentary
Through a combination of intelligent segmentation and traffic routing to tools, you can gain much better visibility into your network. Here's how.
By Jack Hamm Sr. Manager, Security Operations, Gigamon, 5/21/2018
Comment0 comments  |  Read  |  Post a Comment
Report: More Breaches Despite Increasing Security Budgets
Graham Melville, Senior Director, Solutions Marketing, GigamonCommentary
Lack of security talent, low security awareness among employees, and too much data to analyze tops the list of cyberthreats in the 2018 Cyberthreat Defense Threat Report from CyberEdge group.
By Graham Melville Senior Director, Solutions Marketing, Gigamon, 5/8/2018
Comment0 comments  |  Read  |  Post a Comment
3 Ways to Maximize Security and Minimize Business Challenges
Jack Hamm, Sr. Manager, Security Operations, GigamonCommentary
The best strategy for choosing security tools and architecting networks is to focus on staffing and resources, risk tolerance, and business change.
By Jack Hamm Sr. Manager, Security Operations, Gigamon, 4/30/2018
Comment0 comments  |  Read  |  Post a Comment
IDS & IPS: Two Essential Security Measures
Diana Shtil, Senior Manager, Product Marketing, GigamonCommentary
To protect business networks, one line of security isn't enough.
By Diana Shtil Senior Manager, Product Marketing, Gigamon, 4/23/2018
Comment0 comments  |  Read  |  Post a Comment
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3965
PUBLISHED: 2019-03-23
Hospira Symbiq Infusion System 3.13 and earlier allows remote authenticated users to trigger "unanticipated operations" by leveraging "elevated privileges" for an unspecified call to an incorrectly exposed function.
CVE-2016-10743
PUBLISHED: 2019-03-23
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
CVE-2019-9947
PUBLISHED: 2019-03-23
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string or PATH_INFO) follo...
CVE-2019-9948
PUBLISHED: 2019-03-23
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
CVE-2019-9945
PUBLISHED: 2019-03-23
SoftNAS Cloud 4.2.0 and 4.2.1 allows remote command execution. The NGINX default configuration file has a check to verify the status of a user cookie. If not set, a user is redirected to the login page. An arbitrary value can be provided for this cookie to access the web interface without valid user...