Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

News & Commentary
Deepfake Detection Poses Problematic Technology Race
Robert Lemos, Contributing WriterNews
Experts hold out little hope for a robust technical solution in the long term.
By Robert Lemos Contributing Writer, 9/18/2020
Comment0 comments  |  Read  |  Post a Comment
Sumo Logic IPO Prices Higher Than Expected
Kelly Sheridan, Staff Editor, Dark ReadingNews
Co-founder and CTO Christian Beedgen explains what this means for the future of the cloud-based data analytics company.
By Kelly Sheridan Staff Editor, Dark Reading, 9/17/2020
Comment0 comments  |  Read  |  Post a Comment
Developers Need More Usable Static Code Scanners to Head Off Security Bugs
Robert Lemos, Contributing WriterNews
As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers say.
By Robert Lemos Contributing Writer, 8/11/2020
Comment0 comments  |  Read  |  Post a Comment
A Real-World Tool for Organizing, Integrating Your Other Tools
Dark Reading Staff, News
Omdia Cybersecurity Accelerator analyst Eric Parizo describes the value overwhelmed security managers may find in a SPIF.
By Dark Reading Staff , 8/6/2020
Comment0 comments  |  Read  |  Post a Comment
Ratings for Open Source Projects Aim to Make Software More Secure
Robert Lemos, Contributing WriterNews
Two companies have teamed up to rate open source projects, but can adopting repository ratings help developers make better decisions regarding open source?
By Robert Lemos Contributing Writer, 7/27/2020
Comment0 comments  |  Read  |  Post a Comment
Decoding the Verizon DBIR Report: An Insider's Look Beyond the Headlines
Chad Loeven, President of VMRay Inc.Commentary
To truly understand cybersecurity trends, we must look beyond the headlines and ask more of the data. What you learn might surprise you.
By Chad Loeven President of VMRay Inc., 7/13/2020
Comment0 comments  |  Read  |  Post a Comment
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading, Commentary
Data and insight from a leading cybersecurity research and analysis team will broaden the information available to security professionals and technology vendors.
By Tim Wilson, Editor in Chief, Dark Reading , 7/9/2020
Comment1 Comment  |  Read  |  Post a Comment
DHS Shares Data on Top Cyber Threats to Federal Agencies
Robert Lemos, Contributing WriterNews
Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN.
By Robert Lemos Contributing Writer, 7/1/2020
Comment4 comments  |  Read  |  Post a Comment
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing WriterNews
A variety of sites saw as much as seven times the number of domain requests in late March and early April, suggesting attackers attempted massive denial-of-service attacks.
By Robert Lemos Contributing Writer, 5/27/2020
Comment7 comments  |  Read  |  Post a Comment
Companies Struggle for Effective Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
The money companies are spending on cybersecurity tools doesn't necessarily result in better security, a new survey shows.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 5/8/2020
Comment5 comments  |  Read  |  Post a Comment
Cloud Startup Orca Security Raises $20M Series A
Dark Reading Staff, Quick Hits
The Israeli cloud security startup has built a platform to help organizations gain greater visibility into multicloud deployments.
By Dark Reading Staff , 5/5/2020
Comment0 comments  |  Read  |  Post a Comment
Making the Case for Process Documentation in Cyber Threat Intel
Michael Lortz, Consultant/Analyst at OSTB Solutions, LLCCommentary
Standard language and processes, not to mention more efficient dissemination of findings and alerts all make documenting your security processes a must
By Michael Lortz Consultant/Analyst at OSTB Solutions, LLC, 4/22/2020
Comment0 comments  |  Read  |  Post a Comment
Want to Improve Cloud Security? It Starts with Logging
Chris Calvert, VP Product Strategy, Co-Founder, Respond SoftwareCommentary
Remedying the "garbage in, garbage out" problem requires an understanding of what is causing the problem in the first place.
By Chris Calvert VP Product Strategy, Co-Founder, Respond Software, 4/3/2020
Comment3 comments  |  Read  |  Post a Comment
Palo Alto Networks to Buy CloudGenix for $420M
Dark Reading Staff, Quick Hits
Palo Alto Networks plans to integrate CloudGenix's SD-WAN technology into its Prisma SASE platform following the deal.
By Dark Reading Staff , 3/31/2020
Comment3 comments  |  Read  |  Post a Comment
New Report Shows Breach Costs Continuing to Grow
Dark Reading Staff, Quick Hits
The costs associated with data breaches climb alongside the amount of data managed by the enterprise according to the latest Global Protection Index Snapshot.
By Dark Reading Staff , 3/12/2020
Comment0 comments  |  Read  |  Post a Comment
McAfee Acquires Light Point for Browser Isolation Tech
Dark Reading Staff, Quick Hits
Company plans to integrate Light Point Security's technology into the McAfee Secure Web Gateway and its Mvision UCE platform.
By Dark Reading Staff , 2/25/2020
Comment0 comments  |  Read  |  Post a Comment
Security, Networking Collaboration Cuts Breach Cost
Kelly Sheridan, Staff Editor, Dark ReadingNews
CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.
By Kelly Sheridan Staff Editor, Dark Reading, 2/24/2020
Comment0 comments  |  Read  |  Post a Comment
Security Now Merges With Dark Reading
Tim Wilson, Editor in Chief, Dark Reading, News
Readers of Security Now will join the Dark Reading community, gaining access to a wide range of cybersecurity content.
By Tim Wilson, Editor in Chief, Dark Reading , 2/21/2020
Comment0 comments  |  Read  |  Post a Comment
Lumu to Emerge from Stealth at RSAC
Dark Reading Staff, Quick Hits
The new company will focus on giving customers earlier indications of network and server compromise.
By Dark Reading Staff , 2/18/2020
Comment0 comments  |  Read  |  Post a Comment
Keeping a Strong Security Metrics Framework Strong
Joshua Goldfarb, Independent ConsultantCommentary
Don't just report metrics -- analyze, understand, monitor, and adjust them. These 10 tips will show you how.
By Joshua Goldfarb Independent Consultant, 2/11/2020
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
Posted by susanarose
Current Conversations Apparently, no. 
In reply to: Re: hmmm
Post Your Own Reply
Posted by mitchellwekey
Current Conversations So no mentions on cryptocurrencies?
In reply to: hmmm
Post Your Own Reply
Posted by Aperiam
Current Conversations thank you
In reply to: thanks
Post Your Own Reply
More Conversations
PR Newswire
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17098
PUBLISHED: 2020-09-30
Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an attacker to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v10.11.0 and prior version...
CVE-2020-15731
PUBLISHED: 2020-09-30
An improper Input Validation vulnerability in the code handling file renaming and recovery in Bitdefender Engines allows an attacker to write an arbitrary file in a location hardcoded in a specially-crafted malicious file name. This issue affects: Bitdefender Engines versions prior to 7.85448.
CVE-2020-5132
PUBLISHED: 2020-09-30
SonicWall SSL-VPN products and SonicWall firewall SSL-VPN feature misconfiguration leads to possible DNS flaw known as domain name collision vulnerability. When the users publicly display their organization’s internal domain names in the SSL-VPN au...
CVE-2020-15216
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
CVE-2020-4607
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.