DRTV

How to Combat the Security Skills Shortage

50%
50%

A higher volume of online attacks and a dearth of security professionals make it difficult for organizations to protect themselves. CenturyLinks Cybersecurity Architect Jeffrey Krone explains how outsourcing can help companies get the talent, scale, and expertise they need.

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Alishasays
50%
50%
Alishasays,
User Rank: Apprentice
9/1/2017 | 6:46:49 AM
Be risk free, get audited
As the technology is advancing, we are exposed to more and more security breaches. As IT security professionals, we also feel there is a huge lack of skilled security professionals who can help organizations from the external attacks and data breaches. According to a survey, India needs 77000 hackers per year. In this case, we can say there is a hugu demand for security researchers and ethical hackers in our country. While conducting audit for many companies, we have reported vulnerabilities and deadly loophole which might end up in damaging reputation for the company.

We are the best IT Security company based on Kolkata, India. Get in touch with us to solve any information security issue. Check out: https://www.isoah.com/ISO-27001-ISMS-audit.php
Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Microsoft Fixes 11 Critical, 39 Important Vulns
Kelly Sheridan, Staff Editor, Dark Reading,  6/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1060
PUBLISHED: 2018-06-18
python before versions 2.7.15, 3.4.9, 3.5.6 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.
CVE-2018-1090
PUBLISHED: 2018-06-18
In Pulp before version 2.16.2, secrets are passed into override_config when triggering a task and then become readable to all users with read access on the distributor/importer. An attacker with API access can then view these secrets.
CVE-2018-1152
PUBLISHED: 2018-06-18
libjpeg-turbo 1.5.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted BMP image.
CVE-2018-1153
PUBLISHED: 2018-06-18
Burp Suite Community Edition 1.7.32 and 1.7.33 fail to validate the server certificate in a couple of HTTPS requests which allows a man in the middle to modify or view traffic.
CVE-2018-12530
PUBLISHED: 2018-06-18
An issue was discovered in MetInfo 6.0.0. admin/app/batch/csvup.php allows remote attackers to delete arbitrary files via a flienamecsv=../ directory traversal. This can be exploited via CSRF.