Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations //

Identity & Access Management

News & Commentary
Permission Management & the Goldilocks Conundrum
Dotan Bar Noy, Co-Founder and CEO, AuthomizeCommentary
In today's COVID-19 era, managing access has become even more difficult, especially for large organizations. Here's how to get it "just right."
By Dotan Bar Noy Co-Founder and CEO, Authomize, 9/22/2020
Comment0 comments  |  Read  |  Post a Comment
8 Reasons Perimeter Security Alone Won't Protect Your Crown Jewels
Juan Pablo Perez-Etchegoyen, CTO, OnapsisCommentary
Most firewalls and security devices effectively protect systems and data, but are they enough to safeguard business-critical applications?
By Juan Pablo Perez-Etchegoyen CTO, Onapsis, 9/16/2020
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVistaCommentary
While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps.
By Simone Petrella Chief Executive Officer, CyberVista, 9/16/2020
Comment2 comments  |  Read  |  Post a Comment
Taking Security With You in the WFH Era: What to Do Next
A.N. Ananth, President, NetsurionCommentary
As many organizations pivot to working from home, here are some considerations for prioritizing the new security protocols.
By A.N. Ananth President, Netsurion, 9/15/2020
Comment0 comments  |  Read  |  Post a Comment
Zoom Brings Two-Factor Authentication to All Users
Dark Reading Staff, Quick Hits
This marks the latest step Zoom has taken to improve user security as more employees work from home.
By Dark Reading Staff , 9/10/2020
Comment0 comments  |  Read  |  Post a Comment
Top 5 Identity-Centric Security Imperatives for Newly Minted Remote Workers
Morey Haber, CTO and CISO, BeyondTrustCommentary
In the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.
By Morey Haber CTO and CISO, BeyondTrust, 9/9/2020
Comment0 comments  |  Read  |  Post a Comment
Post-COVID-19 Security Spending Update
Ericka Chickowski, Contributing Writer
Security spending growth will slow in 2020, but purse strings are looser than for other areas of IT.
By Ericka Chickowski Contributing Writer, 9/8/2020
Comment0 comments  |  Read  |  Post a Comment
Don't Forget Cybersecurity on Your Back-to-School List
Jeff Wilbur, Senior Director, Online Trust, the Internet SocietyCommentary
School systems don't seem like attractive targets, but they house lots of sensitive data, such as contact information, grades, health records, and more.
By Jeff Wilbur Senior Director, Online Trust, the Internet Society, 9/2/2020
Comment1 Comment  |  Read  |  Post a Comment
Deep Fake: Setting the Stage for Next-Gen Social Engineering
Jon Mendoza, CISO, TechnologentCommentary
Humans are susceptible to normalcy bias, which may leave us vulnerable to disinformation that reinforces our beliefs.
By Jon Mendoza CISO, Technologent, 8/26/2020
Comment2 comments  |  Read  |  Post a Comment
Newly Patched Alexa Flaws a Red Flag for Home Workers
Steve Zurier, Contributing WriterNews
Alexa could serve as an entry point to home and corporate networks. Security experts point to the need for manufacturers to work closely with enterprise security teams to spot and shut down IoT device flaws.
By Steve Zurier Contributing Writer, 8/19/2020
Comment1 Comment  |  Read  |  Post a Comment
Is Edtech the Greatest APT?
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?
By Curtis Franklin Jr. Senior Editor at Dark Reading, 8/11/2020
Comment0 comments  |  Read  |  Post a Comment
EU-US Privacy Shield Dissolution: What Happens Next?
Sam Curry, CSO, CybereasonCommentary
In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.
By Sam Curry CSO, Cybereason, 8/11/2020
Comment0 comments  |  Read  |  Post a Comment
Gamifying Password Training Shows Security Benefits
Robert Lemos, Contributing WriterNews
When picking passwords, users often fall back on certain insecure patterns, but good habits can be learned using simple games, a group of researchers find.
By Robert Lemos Contributing Writer, 8/10/2020
Comment2 comments  |  Read  |  Post a Comment
Attack of the Clone: Next-Gen Social Engineering
Dark Reading Staff, News
NeoEYED CTO Tamaghna Basu tells us how he created an AI bot to mimic him, how it could be used in social engineering attacks, and what the experience taught him about the value of true human connections.
By Dark Reading Staff , 8/5/2020
Comment0 comments  |  Read  |  Post a Comment
Pandemic Credential Stuffing: Cybersecurity's Ultimate Inside Job
Alex Artamonov, System Engineer & Cybersecurity Specialist, Infinitely VirtualCommentary
How stolen credentials for services like Zoom and password reuse practices threaten to compromise other accounts and applications.
By Alex Artamonov System Engineer & Cybersecurity Specialist, Infinitely Virtual, 7/27/2020
Comment0 comments  |  Read  |  Post a Comment
Email Security Features Fail to Prevent Phishable 'From' Addresses
Robert Lemos, Contributing WriterNews
The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers.
By Robert Lemos Contributing Writer, 7/24/2020
Comment1 Comment  |  Read  |  Post a Comment
Deepfakes & James Bond Research Project: Cool but Dangerous
Matt Lewis, Technical Research Director at NCC GroupCommentary
Open source software for creating deepfakes is getting better and better, to the chagrin of researchers
By Matt Lewis Technical Research Director at NCC Group, 7/23/2020
Comment1 Comment  |  Read  |  Post a Comment
4 Steps to a More Mature Identity Program
Mike Kiser, Global Security Advocate, Office of the CTO, SailPointCommentary
Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.
By Mike Kiser Global Security Advocate, Office of the CTO, SailPoint, 7/1/2020
Comment0 comments  |  Read  |  Post a Comment
Back to Basics with Cloud Permissions Management
Raj Mallempati, COO, CloudKnox SecurityCommentary
By using the AAA permissions management framework for cloud operations, organizations can address authentication, authorization, and auditing.
By Raj Mallempati COO, CloudKnox Security, 6/23/2020
Comment0 comments  |  Read  |  Post a Comment
5 Steps for Implementing Multicloud Identity
Eric Olden, CEO, Strata IdentityCommentary
Why embracing, not fighting, decentralization will pave the way to smoother cloud migrations.
By Eric Olden CEO, Strata Identity, 6/23/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by rainajordan
Current Conversations Nice Information, Thanks 
In reply to: Thanks
Post Your Own Reply
More Conversations
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...