Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Tanner Johnson
Twitter
LinkedIn
RSS
E-Mail

Profile of Tanner Johnson

Principal Analyst, Data Security, Omdia
Member Since: 5/23/2019
Author
News & Commentary Posts: 15
Comments: 1

Tanner Johnson is a cybersecurity analyst focused on IoT and transformative technologies at Omdia. His coverage is focused on examining the various threats that occupy the IoT technology domain, as well as opportunities and strategies that are emerging as data connectivity continues to expand.

Prior to focusing on IoT security, Tanner managed and contributed to a wide range of aerospace and defense forecast markets including services, intelligence, and cyber operations for Jane's by IHS Markit.
 
His passion for the cybersecurity market inspired him to seek out additional academic knowledge in the field, and led him to achieve a Master's Degree in cybersecurity through Missouri State University.

Articles by Tanner Johnson

On the Radar: Index Engines Offers Content Analytics for Threat Mitigation

3/23/2021
Index Engines is a developer of data management and data governance technology, focused specifically on unstructured data. In recent years it has enjoyed success with CyberSense, a data analytics tool carved out of one of its products and sold alongside Dell EMCs Cyber Recovery Vault product, to ensure the integrity of backup data. The continued evolution of the ransomware threat will keep vendors like Index Engines in high demand.

Post a Comment

Data security accountability in an age of regular breaches

2/19/2021
Unfortunately, our modern digital era is one frequently characterized by large scale data breaches recurring with considerable regularity. As the number of additional vendors impacted by such breaches show little sign of slowing, one constant question remains: where exactly does accountability for data security lie, and what part do end users play in their own data breach protection?

Post a Comment

On the Radar: Keyavi Data Corp. Makes Data Intelligent, Helping it Secure Itself

1/29/2021
Keyavi Data seeks to grant data intelligent, self-protecting, and self-awareness capabilities that ultimately help make the native security of the data itself more robust. As a result of the growing challenges that remain in place for information protection, Omdia projects that investment in data security solutions will see significant growth in the near term. The consistent demand for fluid data protection presents a welcoming market to vendors such as Keyavi.

Post a Comment

2021 Trends to Watch: IoT Cybersecurity

11/19/2020
The IoT cybersecurity ecosystem has evolved out of the critical necessity to successfully discover, manage, and secure a growing variety of internet connected devices. Now, the new challenge is the growing volume of data created, shared, and transmitted by these devices.

Post a Comment

Fundamentals of Data Security Strategy

10/27/2020
Because of the criticality of comprehensive data security, stakeholders must take concerted, ongoing action to build and support the critical business and technical functions that support sound data security.

Post a Comment
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.