Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

News & Commentary
Compliance Training? What Compliance Training?
Beyond the Edge, Dark Reading
By Beyond the Edge Dark Reading, 8/19/2019
Comment0 comments  |  Read  |  Post a Comment
Beat the Heat: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
Phishing, token codes, training, MFA, polluted data entry, and whales. And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 8/16/2019
Comment0 comments  |  Read  |  Post a Comment
Does Personality Make You Vulnerable to Cybercrime?
Kelly Sheridan, Staff Editor, Dark ReadingNews
A new study explores the connections between personality traits and susceptibility to different cyberattacks.
By Kelly Sheridan Staff Editor, Dark Reading, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
2019 Pwnie Award Winners (And Those Who Wish They Weren't)
Jai Vijayan, Contributing Writer
This year's round-up includes awards into two new categories: most under-hyped research and epic achievement.
By Jai Vijayan Contributing Writer, 8/13/2019
Comment0 comments  |  Read  |  Post a Comment
Dark Reading News Desk Live at Black Hat USA 2019
Sara Peters, Senior Editor at Dark ReadingNews
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
By Sara Peters Senior Editor at Dark Reading, 8/8/2019
Comment1 Comment  |  Read  |  Post a Comment
Black Hat 2019: Security Culture Is Everyone's Culture
Kelly Sheridan, Staff Editor, Dark ReadingNews
In his Black Hat USA keynote, Square's Dino Dai Zovi discussed lessons learned throughout his cybersecurity career and why culture trumps strategy.
By Kelly Sheridan Staff Editor, Dark Reading, 8/7/2019
Comment0 comments  |  Read  |  Post a Comment
Security & the Infinite Capacity to Rationalize
Joshua Goldfarb, Independent ConsultantCommentary
To improve the security posture of our organizations, we must open our eyes to rationalization and put an end to it with logic. Here's how.
By Joshua Goldfarb Independent Consultant, 8/6/2019
Comment2 comments  |  Read  |  Post a Comment
Black Hat: A Summer Break from the Mundane and Controllable
John B. Dickson, CISSP,  Principal, Denim GroupCommentary
Enjoy the respite from the security tasks that await you back at home. Then prepare yourself for the uphill battles to come. Here's how.
By John B. Dickson CISSP, Principal, Denim Group, 8/2/2019
Comment0 comments  |  Read  |  Post a Comment
SecOps Success Through Employee Retention
John Moran, Senior Product Manager, DFLabsCommentary
To keep your turnover low, focus on these areas: compensation, advancement opportunities, training, and environment.
By John Moran Senior Product Manager, DFLabs, 8/1/2019
Comment0 comments  |  Read  |  Post a Comment
Transforming 'Tangible Security' into a Competitive Advantage
Kaan Onarlioglu, Security Architect, AkamaiCommentary
Today's consumers want to see and touch security. Meeting this demand will be a win-win for everyone, from users to vendors to security teams.
By Kaan Onarlioglu Security Architect, Akamai, 7/30/2019
Comment0 comments  |  Read  |  Post a Comment
Black Hat Q&A: Inside the Black Hat NOC
Black Hat Staff,  News
Cybersecurity expert Bart Stump explains what its like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.
By Alex Wawro, Special to Dark Reading , 7/26/2019
Comment0 comments  |  Read  |  Post a Comment
Security Training That Keeps Up with Modern Development
Ericka Chickowski, Contributing WriterNews
Black Hat USA speakers to discuss what it will take to 'shift knowledge left' to build up a corps of security-savvy software engineers.
By Ericka Chickowski Contributing Writer, 7/25/2019
Comment0 comments  |  Read  |  Post a Comment
Business Email Compromise: Thinking Beyond Wire Transfers
Kelly Sheridan, Staff Editor, Dark ReadingNews
As BEC continues to drive record-high losses, cybercriminals devise new tactics for swindling corporate targets out of millions.
By Kelly Sheridan Staff Editor, Dark Reading, 7/23/2019
Comment0 comments  |  Read  |  Post a Comment
The War for Cyber Talent Will Be Won by Retention not Recruitment
Sundeep Nehra & Dr. Mary Kay Vona, Financial Services Organization, Ernst & Young LLPCommentary
Six steps for creating a work environment that challenges, stimulates, rewards, and constantly engages employees fighting the good fight against cybercriminals.
By Sundeep Nehra & Dr. Mary Kay Vona Financial Services Organization, Ernst & Young LLP, 7/23/2019
Comment1 Comment  |  Read  |  Post a Comment
CISO Pressures: Why the Role Stinks and How to Fix It
Rick McElroy, Principal Security Strategist at Carbon BlackCommentary
CISOs spend much less time in their role than other members of the boardroom. It's a serious problem that must be addressed.
By Rick McElroy Principal Security Strategist at Carbon Black, 7/22/2019
Comment0 comments  |  Read  |  Post a Comment
How Capture the Flag Competitions Strengthen the Cybersecurity Workforce
Dr. Giovanni Vigna, Chief Technology Officer at LastlineCommentary
These competitions challenge participants with problems involving digital forensics, cryptography, binary analysis, web security, and many other fields.
By Dr. Giovanni Vigna Chief Technology Officer at Lastline, 7/18/2019
Comment2 comments  |  Read  |  Post a Comment
Is 2019 the Year of the CISO?
Terry Ray, Chief Technology Officer, ImpervaCommentary
The case for bringing the CISO to the C-suite's risk and business-strategy table.
By Terry Ray Chief Technology Officer, Imperva, 7/16/2019
Comment0 comments  |  Read  |  Post a Comment
Frank Taylor: Better Processes Lead to Tighter Security
Terry Sweeney, Contributing Editor
If the now-retired Air Force Brigadier General and first-ever GE CSO ever got the memo about career specialization and 'nichey' expertise, he apparently forgot to read it.
By Terry Sweeney Contributing Editor, 7/15/2019
Comment0 comments  |  Read  |  Post a Comment
Most Organizations Lack Cyber Resilience
Marc Wilczek, Digital Strategist & CIO AdvisorCommentary
Despite increasing threats, many organizations continue to run with only token cybersecurity and resilience.
By Marc Wilczek Digital Strategist & CIO Advisor, 7/11/2019
Comment0 comments  |  Read  |  Post a Comment
Summer: A Time for Vacations & Cyberattacks?
Robert Lemos, Contributing WriterNews
About a third of cybersecurity professionals believe that their companies see more cyberattacks during the summer, but the survey data does not convince on the reasons for the perception of a summer bump.
By Robert Lemos Contributing Writer, 7/11/2019
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by allenred
Current Conversations nice post
In reply to: cyber security
Post Your Own Reply
More Conversations
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15160
PUBLISHED: 2019-08-19
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
CVE-2019-15150
PUBLISHED: 2019-08-19
In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
CVE-2017-18550
PUBLISHED: 2019-08-19
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_get_hba_info does not initialize the hbainfo structure.
CVE-2017-18551
PUBLISHED: 2019-08-19
An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
CVE-2017-18552
PUBLISHED: 2019-08-19
An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency.