Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Privacy

News & Commentary
The California Consumer Privacy Act's Hidden Surprise Has Big Legal Consequences
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLCCommentary
The CCPA's provision devoted to 'reasonable' cybersecurity procedures and policies could trip up your business. Get ready now.
By Beth Burgin Waller Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
FBI Plans to Monitor Social Media May Spark Privacy Issues
Dark Reading Staff, Quick Hits
A new initiative to pull data from social media platforms may clash with policies prohibiting the use of information for mass surveillance.
By Dark Reading Staff , 8/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Security Pros, Congress Reps Talk National Cybersecurity at DEF CON
Kelly Sheridan, Staff Editor, Dark ReadingNews
Cybersecurity and government leaders discussed why Congress is unprepared for a major cyberattack and how the two parties can collaborate.
By Kelly Sheridan Staff Editor, Dark Reading, 8/12/2019
Comment0 comments  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Yes, FaceApp Really Could Be Sending Your Data to Russia
Marc Rogers, Executive Director of Cybersecurity, OktaCommentary
FaceApp has an unprecedented level of access to data from 150 million users. What could its endgame be? We unpack three potential risks.
By Marc Rogers Executive Director of Cybersecurity, Okta, 8/8/2019
Comment0 comments  |  Read  |  Post a Comment
Demystifying New FIDO Standards & Innovations
Bojan Simic, Chief Technology Officer & Co-Founder of HYPRCommentary
Staying on top of the latest cybersecurity risks and preferred attack methods can feel impossible, but standards like FIDO2 are designed to help relieve the burden.
By Bojan Simic Chief Technology Officer & Co-Founder of HYPR, 8/1/2019
Comment0 comments  |  Read  |  Post a Comment
Keep Your Eye on Digital Certificates
Terry Sweeney, Contributing Editor
X.509 certificates help secure the identity, privacy, and communication between two endpoints, but these digital certificates also have built-in expirations and must be managed.
By Terry Sweeney Contributing Editor, 7/31/2019
Comment1 Comment  |  Read  |  Post a Comment
Transforming 'Tangible Security' into a Competitive Advantage
Kaan Onarlioglu, Security Architect, AkamaiCommentary
Today's consumers want to see and touch security. Meeting this demand will be a win-win for everyone, from users to vendors to security teams.
By Kaan Onarlioglu Security Architect, Akamai, 7/30/2019
Comment0 comments  |  Read  |  Post a Comment
Farewell, Dear Password? The Future of Identity and Authorization
Kacy Zurkus, Contributing Writer
Many organizations are questioning whether eliminating passwords as an authentication tool would augment their overall security posture.
By Kacy Zurkus Contributing Writer, 7/30/2019
Comment1 Comment  |  Read  |  Post a Comment
Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs
Robert Lemos, Contributing WriterNews
New study found that any database containing 15 pieces of demographic data could be used to identify individuals.
By Robert Lemos Contributing Writer, 7/26/2019
Comment3 comments  |  Read  |  Post a Comment
Answer These 9 Questions to Determine if Your Data Is Safe
Chad Cragle, Information Security Officer at FormAssemblyCommentary
Data protection regulations are only going to grow tighter. Make sure you're keeping the customer's best interests in mind.
By Chad Cragle Information Security Officer at FormAssembly, 7/25/2019
Comment9 comments  |  Read  |  Post a Comment
Travel Security [from J4vv4D]
Dark Reading,
Do you travel to dangerous places, like Information Security Conferences?
By Dark Reading , 7/24/2019
Comment0 comments  |  Read  |  Post a Comment
79% of US Consumers Fear Webcams Are Watching
Dark Reading Staff, Quick Hits
Widespread privacy concerns have caused 60% of people to cover their laptop webcams some in creative ways survey data shows.
By Dark Reading Staff , 7/18/2019
Comment0 comments  |  Read  |  Post a Comment
GDPR: The Good, the Bad, and the Uncertain
Kacy Zurkus, Contributing Writer
One year post-GDPR implementation it's time to ask the tough question of whether companies are celebrating or cursing these consumer privacy mandates.
By Kacy Zurkus Contributing Writer, 7/16/2019
Comment0 comments  |  Read  |  Post a Comment
German Schools Ban Office 365, Cite Privacy Concerns
Dark Reading Staff, Quick Hits
The ruling follows years of debate over whether German schools and institutions should use Microsoft tools and services.
By Dark Reading Staff , 7/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Android App Publishers Won't Take 'No' for an Answer on Personal Data
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Researchers find more than 1,000 apps in the Google Play store that gather personal data even when the user has denied permission.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 7/8/2019
Comment0 comments  |  Read  |  Post a Comment
Smash-and-Grab Crime Threatens Enterprise Security
Nicko van Someren, Ph.D., Chief Technology Officer at AbsoluteCommentary
Getting your company smartphone or laptop stolen from your car isn't just a hassle; it can have large regulatory ramifications, too. Visibility is the answer.
By Nicko van Someren, Ph.D. Chief Technology Officer at Absolute, 7/8/2019
Comment0 comments  |  Read  |  Post a Comment
Why Your GDPR Implementation Plan Needs CISOs & 'Legal Engineers' to Work Together
Sophie Stalla-Bourdillon, Senior Privacy Counsel and Legal Engineer, ImmutaCommentary
Lawyers must step into the shoes of technical roles and craft legal guidance that can be easily put into use.
By Sophie Stalla-Bourdillon Senior Privacy Counsel and Legal Engineer, Immuta, 7/5/2019
Comment0 comments  |  Read  |  Post a Comment
The Case for Encryption: Fact vs. Fiction
Ramon Peypoch, SVP Products, Vera SecurityCommentary
The common belief that encryption enables bad behavior primarily used by thieves, international terrorists, and other villainous characters is simply not true. Here's why.
By Ramon Peypoch SVP Products, Vera Security, 7/2/2019
Comment0 comments  |  Read  |  Post a Comment
How GDPR Teaches Us to Take a Bottom-Up Approach to Privacy
Matthew Karnas, Cybersecurity & Risk Practice Lead at SilaCommentary
Looking at underlying security needs means organizations are more likely to be in compliance with privacy regulations.
By Matthew Karnas Cybersecurity & Risk Practice Lead at Sila, 6/28/2019
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by allenred
Current Conversations nice post
In reply to: cyber security
Post Your Own Reply
More Conversations
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15160
PUBLISHED: 2019-08-19
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
CVE-2019-15150
PUBLISHED: 2019-08-19
In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
CVE-2017-18550
PUBLISHED: 2019-08-19
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_get_hba_info does not initialize the hbainfo structure.
CVE-2017-18551
PUBLISHED: 2019-08-19
An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
CVE-2017-18552
PUBLISHED: 2019-08-19
An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency.