Operations

News & Commentary
Dino Dai Zovi Dives Into Container Security, SecDevOps
Sara Peters, Senior Editor at Dark ReadingCommentaryVideo
Dino Dai Zovi discusses the under-explored security aspects of Docker, data center orchestration, and containers.
By Sara Peters Senior Editor at Dark Reading, 8/23/2017
Comment0 comments  |  Read  |  Post a Comment
Why Most Security Awareness Training Fails (And What To Do About It)
Tim Wilson, Editor in Chief, Dark Reading, CommentaryVideo
Arun Vishwanath discusses why awareness training shouldn't apply the same cure to every ailment then blame the patient when the treatment doesn't work.
By Tim Wilson, Editor in Chief, Dark Reading , 8/22/2017
Comment0 comments  |  Read  |  Post a Comment
Coming Soon to Dark Reading...
Dark Reading Staff, Commentary
Event calendar: Dark Reading brings you threat intelligence tomorrow, boardroom communication next week, and coming in November, a brand new conference in the D.C. area.
By Dark Reading Staff , 8/22/2017
Comment1 Comment  |  Read  |  Post a Comment
Battle of the AIs: Don't Build a Better Box, Put Your Box in a Better Loop
Mike Convertino, CISO & VP, Information Security, F5 NetworksCommentary
Powered by big data and machine learning, next-gen attacks will include perpetual waves of malware, phishes, and false websites nearly indistinguishable from the real things. Here's how to prepare.
By Mike Convertino CISO & VP, Information Security, F5 Networks, 8/22/2017
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Firm root9B's Assets Up for Sale
Jai Vijayan, Freelance writerNews
Move to foreclose comes after company defaulted on repayment terms for over $10.7 millions in loans it owes creditors.
By Jai Vijayan Freelance writer, 8/21/2017
Comment0 comments  |  Read  |  Post a Comment
Critical Infrastructure, Cybersecurity & the 'Devils Rope'
David Zahn, General Manager of Cybersecurity at PASCommentary
How hackers today are engaging in a modern 'Fence Cutter War' against industrial control systems, and what security professionals need to do about it.
By David Zahn General Manager of Cybersecurity at PAS, 8/17/2017
Comment1 Comment  |  Read  |  Post a Comment
The Day of Reckoning: Cybercrimes Impact on Brand
Tom Kellermann,  CEO & Cofounder, Strategic Cyber Ventures Commentary
Why the security industry needs to invest in architecture that defends against reputational damage as well as other, more traditional threats.
By Tom Kellermann CEO & Cofounder, Strategic Cyber Ventures , 8/16/2017
Comment0 comments  |  Read  |  Post a Comment
20 Tactical Questions SMB Security Teams Should Ask Themselves
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRACommentary
Or why it pays for small- and medium-sized businesses to plan strategically but act tactically.
By Joshua Goldfarb Co-founder & Chief Product Officer, IDDRA, 8/15/2017
Comment2 comments  |  Read  |  Post a Comment
IoT Medical Devices a Major Security Worry in Healthcare, Survey Shows
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Healthcare providers, manufacturers, and regulators say cybersecurity risks of IoT medical devices and connected legacy systems a top concern.
By Dawn Kawamoto Associate Editor, Dark Reading, 8/15/2017
Comment0 comments  |  Read  |  Post a Comment
6 Ways CISOs Can Play a Role in Selling Security
Raymond Pompon, Principal Threat Research Evangelist at F5 Networks
When customers ask tough questions about data security, business service resilience, privacy, regulatory, and reputational risk its best to remain upbeat and positive. Heres how.
By Raymond Pompon Principal Threat Research Evangelist at F5 Networks, 8/10/2017
Comment0 comments  |  Read  |  Post a Comment
Risky Business: Why Enterprises Cant Abdicate Cloud Security
John Moynihan, President, Minuteman GovernanceCommentary
It's imperative for public and private sector organizations to recognize the essential truth that governance of data entrusted to them cannot be relinquished, regardless of where the data is maintained.
By John Moynihan President, Minuteman Governance, 8/7/2017
Comment1 Comment  |  Read  |  Post a Comment
Making Infosec Meetings More Inclusive
Dawn Kawamoto, Associate Editor, Dark ReadingNews
Diversity and inclusion experts explain how to avoid meeting pitfalls that preclude the voices of underrepresented members of the team.
By Dawn Kawamoto Associate Editor, Dark Reading, 8/3/2017
Comment0 comments  |  Read  |  Post a Comment
Why Cybersecurity Needs a Human in the Loop
John Bruce, CEO and Co-Founder of IBM ReslientCommentary
It's no longer comparable to Kasparov versus Deep Blue. When security teams use AI, it's like Kasparov consulting with Deep Blue before deciding on his next move.
By John Bruce CEO and Co-Founder of IBM Reslient, 8/3/2017
Comment2 comments  |  Read  |  Post a Comment
72% of Businesses Plan for Endpoint Security Budget Boost
Kelly Sheridan, Associate Editor, Dark ReadingNews
For a full third of organizations investing more in endpoint security there will be a "substantial" increase in spending.
By Kelly Sheridan Associate Editor, Dark Reading, 8/2/2017
Comment0 comments  |  Read  |  Post a Comment
Staying in Front of Cybersecurity Innovation
Rinki Sethi, Senior Director of Security Operations and Strategy of  Palo Alto NetworksCommentary
Innovation is challenging for security teams because it encompasses two seemingly contradictory ideas: it's happening too slowly and too quickly.
By Rinki Sethi Senior Director of Security Operations and Strategy of Palo Alto Networks, 8/2/2017
Comment1 Comment  |  Read  |  Post a Comment
The Right to Be Forgotten & the New Era of Personal Data Rights
Dimitri Sirota, Founder & CEO of BigIDCommentary
Because of the European Union's GDPR and other pending legislation, companies must become more transparent in how they protect their customers' data.
By Dimitri Sirota Founder & CEO of BigID, 7/27/2017
Comment1 Comment  |  Read  |  Post a Comment
The Wild West of Security Post-Secondary Education
Ericka Chickowski, Contributing Writer, Dark ReadingNews
Black Hat researchers will show how inconsistent security schooling is at the university level.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/26/2017
Comment1 Comment  |  Read  |  Post a Comment
10 Critical Steps to Create a Culture of Cybersecurity
Edward J. McAndrew, Partner & Co-Chair, Privacy & Data Security  Group, Ballard Spahr LLP, Faculty Member of the Compliance, Governance &  Oversight CouncilCommentary
Businesses are more vulnerable than they need to be. Here's what you should do about it.
By Edward J. McAndrew Partner & Co-Chair, Privacy & Data Security Group, Ballard Spahr LLP, Faculty Member of the Compliance, Governance & Oversight Council, 7/26/2017
Comment2 comments  |  Read  |  Post a Comment
How 'Postcript' Exploits Networked Printers
Dawn Kawamoto, Associate Editor, Dark ReadingNews
At Black Hat 2017, a university researcher will demo how attackers can drill into networked printers by way of the ubiquitous PostScript programming language.
By Dawn Kawamoto Associate Editor, Dark Reading, 7/25/2017
Comment0 comments  |  Read  |  Post a Comment
How Women Can Raise Their Profile within the Cybersecurity Industry
Jodie Nel, Event Organizer, Cyber Security Event SeriesCommentary
Closing the cybersecurity gender gap won't happen overnight, but women can take can take steps to begin leveling the playing field.
By Jodie Nel Event Organizer, Cyber Security Event Series, 7/25/2017
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by salynage
Current Conversations really its good
In reply to: Re: Pending Review
Post Your Own Reply
Posted by recomasa
Current Conversations thank you 
In reply to: thanks
Post Your Own Reply
More Conversations
PR Newswire
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.