DRTV

How to Combat the Security Skills Shortage

50%
50%

A higher volume of online attacks and a dearth of security professionals make it difficult for organizations to protect themselves. CenturyLinks Cybersecurity Architect Jeffrey Krone explains how outsourcing can help companies get the talent, scale, and expertise they need.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Alishasays
50%
50%
Alishasays,
User Rank: Apprentice
9/1/2017 | 6:46:49 AM
Be risk free, get audited
As the technology is advancing, we are exposed to more and more security breaches. As IT security professionals, we also feel there is a huge lack of skilled security professionals who can help organizations from the external attacks and data breaches. According to a survey, India needs 77000 hackers per year. In this case, we can say there is a hugu demand for security researchers and ethical hackers in our country. While conducting audit for many companies, we have reported vulnerabilities and deadly loophole which might end up in damaging reputation for the company.

We are the best IT Security company based on Kolkata, India. Get in touch with us to solve any information security issue. Check out: https://www.isoah.com/ISO-27001-ISMS-audit.php
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6691
PUBLISHED: 2019-01-23
phpwind 9.0.2.170426 UTF8 allows SQL Injection via the admin.php?m=backup&c=backup&a=doback tabledb[] parameter, related to the "--backup database" option.
CVE-2018-19019
PUBLISHED: 2019-01-22
A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
CVE-2019-6260
PUBLISHED: 2019-01-22
The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and firmware implement Advanced High-performance Bus (AHB) bridges, which allow arbitrary read and write access to the BMC's physical address space from the host (or from the network in unusual cases where the BMC console u...
CVE-2018-19011
PUBLISHED: 2019-01-22
CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application.
CVE-2018-19013
PUBLISHED: 2019-01-22
An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file.