Operations

News & Commentary
As Businesses Move Critical Data to Cloud, Security Risks Abound
Kelly Sheridan, Staff Editor, Dark ReadingNews
Companies think their data is safer in the public cloud than in on-prem data centers, but the transition is driving security issues.
By Kelly Sheridan Staff Editor, Dark Reading, 2/20/2019
Comment0 comments  |  Read  |  Post a Comment
Mastercard, GCA Create Small Business Cybersecurity Toolkit
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
A new toolkit developed by the Global Cybersecurity Alliance aims to give small businesses a cookbook for better cybersecurity.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/20/2019
Comment0 comments  |  Read  |  Post a Comment
9 Years After: From Operation Aurora to Zero Trust
Andy Ellis, Chief Security Officer, AkamaiCommentary
How the first documented nation-state cyberattack is changing security today.
By Andy Ellis Chief Security Officer, Akamai, 2/20/2019
Comment0 comments  |  Read  |  Post a Comment
The Anatomy of a Lazy Phish
Jordan Shakhsheer, Information Security Engineer, Bluestone AnalyticsCommentary
A security engineer breaks down how easy it is for unskilled attackers to trick an unsuspecting user to submit credentials to a phishing site.
By Jordan Shakhsheer Information Security Engineer, Bluestone Analytics, 2/20/2019
Comment0 comments  |  Read  |  Post a Comment
Privacy Ops: The New Nexus for CISOs & DPOs
Amit Ashbel, Security Evangelist, CognigoCommentary
No longer can privacy be an isolated function managed by legal or compliance departments with little or no connection to the organization's underlying security technology.
By Amit Ashbel Security Evangelist, Cognigo, 2/18/2019
Comment1 Comment  |  Read  |  Post a Comment
How to Create a Dream Team for the New Age of Cybersecurity
Gaurav Banga, Founder and CEO, BalbixCommentary
When each member of your security team is focused on one narrow slice of the pie, it's easy for adversaries to enter through the cracks. Here are five ways to stop them.
By Gaurav Banga Founder and CEO, Balbix, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
Security Spills: 9 Problems Causing the Most Stress
Kelly Sheridan, Staff Editor, Dark Reading
Security practitioners reveal what's causing them the most frustration in their roles.
By Kelly Sheridan Staff Editor, Dark Reading, 2/14/2019
Comment0 comments  |  Read  |  Post a Comment
5 Expert Tips for Complying with the New PCI Software Security Framework
Rohit Sethi, COO of Security CompassCommentary
The Secure SLC Standard improves business efficiency for payment application vendors but could also stand as new security benchmark for other industries to follow.
By Rohit Sethi COO of Security Compass, 2/13/2019
Comment0 comments  |  Read  |  Post a Comment
'Picnic' Passes Test for Protecting IoT From Quantum Hacks
Dark Reading Staff, Quick Hits
Researchers from DigiCert, Utimaco, and Microsoft Research gives thumbs-up to a new algorithm for implementing quantum hacking-proof digital certificates.
By Dark Reading Staff , 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
2019 Security Spending Outlook
Ericka Chickowski, Contributing Writer, Dark Reading
Cybersecurity and IT risk budgets continue to grow. Here's how they'll be spent.
By Ericka Chickowski Contributing Writer, Dark Reading, 2/12/2019
Comment0 comments  |  Read  |  Post a Comment
6 Reasons to Be Wary of Encryption in Your Enterprise
Curtis Franklin Jr., Senior Editor at Dark Reading
Encryption can be critical to data security, but it's not a universal panacea.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/8/2019
Comment1 Comment  |  Read  |  Post a Comment
A Dog's Life: Dark Reading Caption Contest Winners
Marilyn Cohodas, Managing Editor, Dark ReadingCommentary
What do a telephony protocol, butt-sniffing, and multifactor authentication have in common? A John Klossner cartoon! And the winners are ...
By Marilyn Cohodas Managing Editor, Dark Reading, 2/8/2019
Comment0 comments  |  Read  |  Post a Comment
We Need More Transparency in Cybersecurity
Grant Wernick, Co-Founder & CEO of Insight EnginesCommentary
Security has become a stand-alone part of the corporate IT organization. That must stop, and transparency is the way forward.
By Grant Wernick Co-Founder & CEO of Insight Engines, 2/8/2019
Comment0 comments  |  Read  |  Post a Comment
When 911 Goes Down: Why Voice Network Security Must Be a Priority
Mykola Konrad, Vice President of Product Management, Ribbon CommunicationsCommentary
When there's a DDoS attack against your voice network, are you ready to fight against it?
By Mykola Konrad Vice President of Product Management, Ribbon Communications, 2/7/2019
Comment2 comments  |  Read  |  Post a Comment
HelpSystems Buys Core Security Assets to Grow Infosec Portfolio
Dark Reading Staff, Quick Hits
Acquisition will enable it to provide threat detection, pen testing, and other security tools to customers.
By Dark Reading Staff , 2/6/2019
Comment1 Comment  |  Read  |  Post a Comment
4 Practical Questions to Ask Before Investing in AI
Ilia Kolochenko, CEO and Founder, High-Tech BridgeCommentary
A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.
By Ilia Kolochenko CEO and Founder, High-Tech Bridge, 2/6/2019
Comment1 Comment  |  Read  |  Post a Comment
Serverless Computing: 'Function' vs. 'Infrastructure' as-a-Service
Ory Segal, CTO, PureSecCommentary
How much do companies really gain from offloading security duties to the cloud? Let's do the math.
By Ory Segal CTO, PureSec, 2/6/2019
Comment2 comments  |  Read  |  Post a Comment
7 Tips for Communicating with the Board
Jai Vijayan, Freelance writer
The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk.
By Jai Vijayan Freelance writer, 2/6/2019
Comment1 Comment  |  Read  |  Post a Comment
New Vulnerabilities Make RDP Risks Far from Remote
Curtis Franklin Jr., Senior Editor at Dark ReadingNews
More than two dozen vulnerabilities raise the risk of using RDP clients to remotely manage and configure systems.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/5/2019
Comment2 comments  |  Read  |  Post a Comment
How Hackers Could Hit Super Bowl LIII
Kelly Sheridan, Staff Editor, Dark ReadingNews
Security threats and concerns abound for the year's biggest football game. What officials and fans can do about it.
By Kelly Sheridan Staff Editor, Dark Reading, 2/1/2019
Comment2 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3474
PUBLISHED: 2019-02-20
A path traversal vulnerability in the web application component of Micro Focus Filr 3.x allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Filr server. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-3475
PUBLISHED: 2019-02-20
A local privilege escalation vulnerability in the famtd component of Micro Focus Filr 3.0 allows a local attacker authenticated as a low privilege user to escalate to root. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-10030
PUBLISHED: 2019-02-20
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVE-2019-10030
PUBLISHED: 2019-02-20
A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through anoth...
CVE-2019-10030
PUBLISHED: 2019-02-20
A server-side request forgery vulnerability exists in Jenkins Mattermost Notification Plugin 2.6.2 and earlier in MattermostNotifier.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified Mattermost server and room and send a message.