Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Slideshows

Latest Content
Page 1 / 2   >   >>
9 Security Podcasts Worth Tuning In To
Slideshows  |  4/7/2020  | 
Recommendations for podcasts discussing news, trends, guidance, and stories across the cybersecurity industry.
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Slideshows  |  3/31/2020  | 
These products and services could be of immediate help to infosec pros now protecting their organizations while working from home.
10 Security Services Options for SMBs
Slideshows  |  3/26/2020  | 
Outsourcing security remains one of the best ways for small to midsize businesses to protect themselves from cyberthreats.
8 Infosec Page-Turners for Days Spent Indoors
Slideshows  |  3/23/2020  | 
Stuck inside and looking for a new read? Check out these titles written by security practitioners and reporters across the industry.
Security Lessons We've Learned (So Far) from COVID-19
Slideshows  |  3/17/2020  | 
Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.
What Cybersecurity Pros Really Think About Artificial Intelligence
Slideshows  |  3/13/2020  | 
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.
Keys to Hiring Cybersecurity Pros When Certification Can't Help
Slideshows  |  3/10/2020  | 
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
7 Cloud Attack Techniques You Should Worry About
Slideshows  |  3/6/2020  | 
Security pros detail the common and concerning ways attackers target enterprise cloud environments.
7 Loyalty Program and Rewards App Attacks
Slideshows  |  3/4/2020  | 
The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights.
6 Truths About Disinformation Campaigns
Slideshows  |  2/28/2020  | 
Disinformation goes far beyond just influencing election outcomes. Here's what security pros need to know.
7 Tips to Improve Your Employees' Mobile Security
Slideshows  |  2/24/2020  | 
Security experts discuss the threats putting mobile devices at risk and how businesses can better defend against them.
8 Things Users Do That Make Security Pros Miserable
Slideshows  |  2/18/2020  | 
When a user interacts with an enterprise system, the result can be productivity or disaster. Here are eight opportunities for the disaster side to win out over the productive.
7 Tax Season Security Tips
Slideshows  |  2/13/2020  | 
Security pros need be on high alert from now until Tax Day on April 15. Here are seven ways to help keep your company safe.
6 Factors That Raise the Stakes for IoT Security
Slideshows  |  2/10/2020  | 
Developments that exacerbate the risk and complicate making Internet of Things devices more secure.
RSAC Sets Finalists for Innovation Sandbox
Slideshows  |  2/6/2020  | 
The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.
7 Ways SMBs Can Secure Their Websites
Slideshows  |  2/4/2020  | 
Here's what small and midsize businesses should consider when they decide it's time to up their website security.
9 Things Application Security Champions Need to Succeed
Slideshows  |  1/29/2020  | 
Common elements to highly effective security champion programs that take DevSecOps to the next level
7 Tips for Infosec Pros Considering a Lateral Career Move
Slideshows  |  1/21/2020  | 
Looking to switch things up but not sure how to do it? Security experts share their advice for switching career paths in the industry.
7 Ways to Get the Most Out of a Penetration Test
Slideshows  |  1/17/2020  | 
You'll get the best results when youre clear on what you want to accomplish from a pen test.
7 Free Tools for Better Visibility Into Your Network
Slideshows  |  1/9/2020  | 
It's hard to protect what you don't know is there. These free tools can help you understand just what it is that you need to protect -- and need to protect yourself from.
6 Security Team Goals for DevSecOps in 2020
Slideshows  |  1/2/2020  | 
Huge opportunities await security teams that are finally ready move the needle on security problems that have plagued organizations for years.
How AI and Cybersecurity Will Intersect in 2020
Slideshows  |  12/30/2019  | 
Understanding the new risks and threats posed by increased use of artificial intelligence.
6 Traits to Develop for Cybersecurity Success
Slideshows  |  12/20/2019  | 
Cultivate these half-dozen qualities and watch your career soar.
7 Tips to Keep Your Family Safe Online Over the Holidays
Slideshows  |  12/17/2019  | 
Security experts offer key cyber advice for family members.
Lessons Learned from 7 Big Breaches in 2019
Slideshows  |  12/13/2019  | 
Capital One, Macy's, FEMA, and others: key takeaways from the year's most notable breaches.
10 Notable Cybersecurity Acquisitions of 2019, Part 2
Slideshows  |  12/9/2019  | 
As mergers and acquisitions continued to shape the security industry throughout 2019, these deals were most significant.
Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Slideshows  |  12/2/2019  | 
Make your favorite security experts laugh with these affordable holiday gifts.
7 Ways to Hang Up on Voice Fraud
Slideshows  |  11/27/2019  | 
Criminals are coming at us from all direction, including our phones. Don't answer that next call without reading this tips first.
6 Top Nontechnical Degrees for Cybersecurity
Slideshows  |  11/21/2019  | 
A computer science degree isn't the only path into a cybersecurity career.
13 Security Pros Share Their Most Valuable Experiences
Slideshows  |  11/18/2019  | 
From serving as an artillery Marine to working a help desk, infosec practitioners pinpoint experiences that had the greatest influence on their careers.
6 Small-Business Password Managers
Slideshows  |  11/8/2019  | 
The right password manager can help bring enterprise-class security to small businesses. Here are a half-dozen candidates to strengthen your access management.
10 Tips for Building Compliance by Design into Cloud Architecture
Slideshows  |  11/5/2019  | 
A pair of experts pass along lessons learned while building out the team and processes necessary to support Starbucks' mobile app.
8 Holiday Security Tips for Retailers
Slideshows  |  11/1/2019  | 
Here's how retailers can protect their businesses from attackers and scammers hoping to wreak havoc during the most wonderful time of the year.
8 Trends in Vulnerability and Patch Management
Slideshows  |  10/30/2019  | 
Unpatched flaws continue to be a major security issue for many organizations.
8 Tips for More Secure Mobile Computing
Slideshows  |  10/23/2019  | 
Mobile devices are a huge part of enterprise IT. Here's what to advise their users to do to keep their devices and critical business data best protected.
State of SMB Insecurity by the Numbers
Slideshows  |  10/17/2019  | 
SMBs still perceive themselves at low risk from cyberthreats in spite of attack statistics that paint a different pictur
7 SMB Security Tips That Will Keep Your Company Safe
Slideshows  |  10/11/2019  | 
With National Cybersecurity Awareness Month as a backdrop, industry leaders weigh in on how SMBs can more effectively protect themselves from cyberattacks.
7 Considerations Before Adopting Security Standards
Slideshows  |  10/8/2019  | 
Here's what to think through as you prepare your organization for standards compliance.
8 Ways Businesses Unknowingly Help Hackers
Slideshows  |  10/4/2019  | 
From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in.
8 Microsegmentation Pitfalls to Avoid
Slideshows  |  9/30/2019  | 
Don't fall victim to these common mistakes on the path to developing better security boundaries and limiting the blast radius of security incidents.
5 Updates from PCI SSC That You Need to Know
Slideshows  |  9/25/2019  | 
As payment technologies evolve, so do the requirements for securing cardholder data.
7 Ways VPNs Can Turn from Ally to Threat
Slideshows  |  9/21/2019  | 
VPNs are critical pieces of the security infrastructure, but they can be vulnerable, hackable, and weaponized against you. Here are seven things to be aware of before you ignore your VPN.
Cybercriminal's Black Market Pricing Guide
Slideshows  |  9/17/2019  | 
Common prices criminals pay one another for products and services that fuel the cybercriminal ecosystem.
6 Questions to Ask Once Youve Learned of a Breach
Slideshows  |  9/13/2019  | 
With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.
Security Leaders Share Tips for Boardroom Chats
Slideshows  |  9/12/2019  | 
Cisco, Oracle, and LinkedIn security leaders share their challenges in communicating with business teams and advice for how CISOs can navigate the relationship.
7 Steps to Web App Security
Slideshows  |  9/3/2019  | 
Emerging technologies are introducing entirely new ways to reach, act, and interact with people. That makes app security more important than ever.
7 Breaches & Hacks That Throw Shade on Biometric Security
Slideshows  |  8/30/2019  | 
Stolen fingerprints, fake hands, voice synthetization, and other nefarious techniques show biometrics has plenty of challenges.
6 Ways Airlines and Hotels Can Keep Their Networks Secure
Slideshows  |  8/27/2019  | 
As recent news can attest, travel and hospitality companies are prime targets for cybercriminals. Here are six privacy and security tips that can help lock down privacy and security.
10 Low-Cost (or Free!) Ways to Boost Your Security AI Skills
Slideshows  |  8/23/2019  | 
The following hardware and software options will amplify your know-how about artificial intelligence and how to apply it to security without busting any budgets.
7 Big Factors Putting Small Businesses At Risk
Slideshows  |  8/21/2019  | 
Small organizations still face a long list of security threats. These threats and vulnerabilities should be top of mind.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11509
PUBLISHED: 2020-04-07
An XSS vulnerability in the WP Lead Plus X plugin through 0.98 for WordPress allows remote attackers to upload page templates containing arbitrary JavaScript via the c37_wpl_import_template admin-post action (which will execute in an administrator's browser if the template is used to create a page).
CVE-2020-6647
PUBLISHED: 2020-04-07
An improper neutralization of input vulnerability in the dashboard of FortiADC may allow an authenticated attacker to perform a cross site scripting attack (XSS) via the name parameter.
CVE-2020-9286
PUBLISHED: 2020-04-07
An improper authorization vulnerability in FortiADC may allow a remote authenticated user with low privileges to perform certain actions such as rebooting the system.
CVE-2020-11508
PUBLISHED: 2020-04-07
An XSS vulnerability in the WP Lead Plus X plugin through 0.98 for WordPress allows logged-in users with minimal permissions to create or replace existing pages with a malicious page containing arbitrary JavaScript via the wp_ajax_core37_lp_save_page (aka core37_lp_save_page) AJAX action.
CVE-2013-7488
PUBLISHED: 2020-04-07
perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.