Careers & People

News & Commentary
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game DesignerCommentary
There are severe and unsolved problems in our industry that justify a sustained effort and substantial investment. It's worth picking one.
By Adam Shostack Consultant, Entrepreneur, Technologist, Game Designer, 2/19/2019
Comment2 comments  |  Read  |  Post a Comment
Security Leaders Are Fallible, Too
Roselle Safran & Utpal Desai, President of Rosint Labs/Director of Product Management of BitdefenderCommentary
Security leaders set the tone for their organizations, and there are many places where the process can go wrong. Second in a six-part series.
By Roselle Safran & Utpal Desai President of Rosint Labs/Director of Product Management of Bitdefender, 2/19/2019
Comment0 comments  |  Read  |  Post a Comment
Privacy Ops: The New Nexus for CISOs & DPOs
Amit Ashbel, Security Evangelist, CognigoCommentary
No longer can privacy be an isolated function managed by legal or compliance departments with little or no connection to the organization's underlying security technology.
By Amit Ashbel Security Evangelist, Cognigo, 2/18/2019
Comment1 Comment  |  Read  |  Post a Comment
White-Hat Bug Bounty Programs Draw Inspiration from the Old West
Michelle Moore, Academic Director and Adjunct Professor, University of San DiegoCommentary
These programs are now an essential strategy in keeping the digital desperados at bay.
By Michelle Moore Academic Director and Adjunct Professor, University of San Diego, 2/15/2019
Comment0 comments  |  Read  |  Post a Comment
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writerNews
Some have even turned to alcohol and medication to cope with pressure.
By Jai Vijayan Freelance writer, 2/14/2019
Comment3 comments  |  Read  |  Post a Comment
New Professional Development Institute Aims to Combat Cybersecurity Skills Shortage
Dark Reading Staff, Quick Hits
The (ISC)2 announces a new institute for working cybersecurity professionals to continue their education.
By Dark Reading Staff , 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
Diversity Is Vital to Advance Security
Joan Pepin, CISO & VP of Operations, Auth0Commentary
Meet five female security experts who are helping to propel our industry forward.
By Joan Pepin CISO & VP of Operations, Auth0, 2/14/2019
Comment1 Comment  |  Read  |  Post a Comment
How to Create a Dream Team for the New Age of Cybersecurity
Gaurav Banga, Founder and CEO, BalbixCommentary
When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.
By Gaurav Banga Founder and CEO, Balbix, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
Security Spills: 9 Problems Causing the Most Stress
Kelly Sheridan, Staff Editor, Dark Reading
Security practitioners reveal what's causing them the most frustration in their roles.
By Kelly Sheridan Staff Editor, Dark Reading, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity and the Human Element: We're All Fallible
Roselle Safran & Utpal Desai, President of Rosint Labs/Director of Product Management of BitdefenderCommentary
We examine the issue of fallibility from six sides: end users, security leaders, security analysts, IT security administrators, programmers, and attackers.
By Roselle Safran & Utpal Desai President of Rosint Labs/Director of Product Management of Bitdefender, 2/12/2019
Comment1 Comment  |  Read  |  Post a Comment
Identifying, Understanding & Combating Insider Threats
Ilan Paretsky, Chief Marketing Officer of EricomCommentary
Your organization is almost certainly on the lookout for threats from outside the company. But are you ready to address threats from within?
By Ilan Paretsky Chief Marketing Officer of Ericom, 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
A Dog's Life: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
What do a telephony protocol, butt-sniffing, and multifactor authentication have in common? A John Klossner cartoon! And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 2/8/2019
Comment0 comments  |  Read  |  Post a Comment
We Need More Transparency in Cybersecurity
Grant Wernick, Co-Founder & CEO of Insight EnginesCommentary
Security has become a stand-alone part of the corporate IT organization. That must stop, and transparency is the way forward.
By Grant Wernick Co-Founder & CEO of Insight Engines, 2/8/2019
Comment0 comments  |  Read  |  Post a Comment
4 Practical Questions to Ask Before Investing in AI
Ilia Kolochenko, CEO and Founder, High-Tech BridgeCommentary
A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.
By Ilia Kolochenko CEO and Founder, High-Tech Bridge, 2/6/2019
Comment1 Comment  |  Read  |  Post a Comment
KISS, Cyber & the Humble but Nourishing Chickpea
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA Commentary
The combination of simple, straightforward, and methodical ingredients are the keys to developing a balanced and well-rounded security program.
By Joshua Goldfarb Co-founder & Chief Product Officer, IDRRA , 2/1/2019
Comment0 comments  |  Read  |  Post a Comment
Yes, You Can Patch Stupid
Ira Winkler, CISSP, President, Secure MentemCommentary
Before you start calling users stupid, remember that behind every stupid user is a stupider security professional.
By Ira Winkler CISSP, President, Secure Mentem, 1/30/2019
Comment5 comments  |  Read  |  Post a Comment
Creating a Security Culture & Solving the Human Problem
Adam Marre,  Information Security Operations Leader, QualtricsCommentary
People are the biggest weakness to security breaches; people can also be your organization's biggest defense.
By Adam Marre Information Security Operations Leader, Qualtrics, 1/29/2019
Comment3 comments  |  Read  |  Post a Comment
3 Ways Companies Mess Up GDPR Compliance the Most
Jason Wang, Founder & CEO, TrueVaultCommentary
The best way to conform to the EU's new privacy regulation is to assume that you don't need to hold on to personal data, versus the opposite.
By Jason Wang Founder & CEO, TrueVault, 1/28/2019
Comment0 comments  |  Read  |  Post a Comment
Security Talent Continues to Fetch Top Dollar on IT Job Market
Dark Reading Staff, Quick Hits
IT and cybersecurity positions continue to rank near the top of the salary ranges paid to IT professionals, according to a new survey.
By Dark Reading Staff , 1/22/2019
Comment3 comments  |  Read  |  Post a Comment
Kudos to the Unsung Rock Stars of Security
Ira Winkler, CISSP, President, Secure MentemCommentary
It is great to have heroes, but the real security heroes are the men and women who keep the bad guys out while fighting their own organizations at the same time.
By Ira Winkler CISSP, President, Secure Mentem, 1/11/2019
Comment3 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3474
PUBLISHED: 2019-02-20
A path traversal vulnerability in the web application component of Micro Focus Filr 3.x allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Filr server. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-3475
PUBLISHED: 2019-02-20
A local privilege escalation vulnerability in the famtd component of Micro Focus Filr 3.0 allows a local attacker authenticated as a low privilege user to escalate to root. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-10030
PUBLISHED: 2019-02-20
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVE-2019-10030
PUBLISHED: 2019-02-20
A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through anoth...
CVE-2019-10030
PUBLISHED: 2019-02-20
A server-side request forgery vulnerability exists in Jenkins Mattermost Notification Plugin 2.6.2 and earlier in MattermostNotifier.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified Mattermost server and room and send a message.