Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

News & Commentary
A Day in The Life of a Pen Tester
Kelly Sheridan, Staff Editor, Dark ReadingNews
Two penetration testers share their day-to-day responsibilities, challenges they encounter, and the skills they value most on the job.
By Kelly Sheridan Staff Editor, Dark Reading, 4/2/2020
Comment0 comments  |  Read  |  Post a Comment
Prioritizing High-Risk Assets: A 4-Step Approach to Mitigating Insider Threats
David A. Sanders, Director of Insider Threat Operations at HaystaxCommentary
Sound insider threat detection programs combine contextual data and a thorough knowledge of employee roles and behaviors to pinpoint the biggest risks.
By David A. Sanders Director of Insider Threat Operations at Haystax, 4/2/2020
Comment0 comments  |  Read  |  Post a Comment
Why All Employees Are Responsible for Company Cybersecurity
Diya Jolly, Chief Product Officer, OktaCommentary
It's not just the IT and security team's responsibility to keep data safe -- every member of the team needs to be involved.
By Diya Jolly Chief Product Officer, Okta, 4/1/2020
Comment0 comments  |  Read  |  Post a Comment
Securing Your Remote Workforce: A Coronavirus Guide for Businesses
Lance Spitzner, Director, SANS Institute Securing The Human Security Awareness ProgramCommentary
Often the hardest part in creating an effective awareness program is deciding what NOT to teach.
By Lance Spitzner Director, SANS Institute Securing The Human Security Awareness Program, 3/30/2020
Comment0 comments  |  Read  |  Post a Comment
COVID-19: Getting Ready for the Next Business Continuity Challenge
Steve Winterfeld, Advisory CISO at AkamaiCommentary
What comes after you've empowered your remote workforce in the wake of the coronavirus pandemic? Dealing with a large portion of that workforce getting sick at the same time.
By Steve Winterfeld Advisory CISO at Akamai, 3/25/2020
Comment1 Comment  |  Read  |  Post a Comment
From Zero to Hero: CISO Edition
Mike Convertino, Chief Security Officer at Arceo.aiCommentary
It's time for organizations to realize that an empowered CISO can effectively manage enterprise risk and even grow the business along the way.
By Mike Convertino Chief Security Officer at Arceo.ai, 3/23/2020
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Cybersecurity Crossword Puzzle
Edge Editors, Dark Reading
Here's a little something to snuggle up with if you're on lockdown.
By Edge Editors Dark Reading, 3/20/2020
Comment1 Comment  |  Read  |  Post a Comment
Achieving DevSecOps Requires Cutting Through the Jargon
Mario DiNatale, Head of Platform Security. ZeroNorthCommentary
Establishing a culture where security can work easily with developers starts with making sure they can at least speak the same language.
By Mario DiNatale Head of Platform Security. ZeroNorth, 3/19/2020
Comment2 comments  |  Read  |  Post a Comment
What the Battle of Britain Can Teach Us About Cybersecurity's Human Element
Eyal Benishti, CEO & Founder of IRONSCALESCommentary
During WWII, the British leveraged both technology and human intelligence to help win the war. Security leaders must learn the lessons of history and consider how the human element can make their machine-based systems more effective.
By Eyal Benishti CEO & Founder of IRONSCALES, 3/18/2020
Comment0 comments  |  Read  |  Post a Comment
4 Ways Thinking 'Childishly' Can Empower Security Professionals
Michal Bar, Head of Cybersecurity Professional Services at CylusCommentary
Younger minds -- more agile and less worried by failure -- provide a useful model for cyber defenders to think more creatively.
By Michal Bar Head of Cybersecurity Professional Services at Cylus, 3/16/2020
Comment1 Comment  |  Read  |  Post a Comment
What Cybersecurity Pros Really Think About Artificial Intelligence
Ericka Chickowski, Contributing Writer
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.
By Ericka Chickowski Contributing Writer, 3/13/2020
Comment1 Comment  |  Read  |  Post a Comment
Working from Home? These Tips Can Help You Adapt
Andy Ellis, Chief Security Officer, AkamaiCommentary
COVID-19 means many people are doing their jobs from outside the confines of the office. That may not be as easy as it sounds.
By Andy Ellis Chief Security Officer, Akamai, 3/12/2020
Comment0 comments  |  Read  |  Post a Comment
Back to the Future: A Threat Intelligence Journey
Michelle Alvarez, Manager, Threat Intelligence Production Team, IBM X-Force IRISCommentary
Threat intelligence needs the problem solvers, the curious ones, the mission seekers, the analytical minds, the defenders, and the fierce -- whatever their gender.
By Michelle Alvarez Manager, Threat Intelligence Production Team, IBM X-Force IRIS, 3/12/2020
Comment0 comments  |  Read  |  Post a Comment
Gender Equality in Cybersecurity Could Drive Economic Boost
Dark Reading Staff, Quick Hits
If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.
By Dark Reading Staff , 3/11/2020
Comment0 comments  |  Read  |  Post a Comment
3 Tips to Stay Secure When You Lose an Employee
Bil Harmer​, CISO & Chief Evangelist at SecureAuthCommentary
Whether they leave for a better job or get fired, and whether they mean to cause problems or do so out of ignorance, ex-workers can pose a threat to your company.
By Bil Harmer​ CISO & Chief Evangelist at SecureAuth, 3/10/2020
Comment0 comments  |  Read  |  Post a Comment
Keys to Hiring Cybersecurity Pros When Certification Can't Help
Curtis Franklin Jr., Senior Editor at Dark Reading
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/10/2020
Comment1 Comment  |  Read  |  Post a Comment
Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading
The former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyberthreats our nation and its businesses face today.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/6/2020
Comment0 comments  |  Read  |  Post a Comment
Securing Our Elections Requires Change in Technology, People & Attitudes
Earl D. Matthews, Senior Vice President and Chief Strategy Officer at VerodinCommentary
Increasing security around our election process and systems will take a big effort from many different parties. Here's how.
By Earl D. Matthews Senior Vice President and Chief Strategy Officer at Verodin, 3/6/2020
Comment0 comments  |  Read  |  Post a Comment
CISOs Who Want a Seat at the DevOps Table Better Bring Value
John Worrall, Chief Executive Officer at ZeroNorthCommentary
Here are four ways to make inroads with the DevOps team -- before it's too late.
By John Worrall Chief Executive Officer at ZeroNorth, 3/4/2020
Comment0 comments  |  Read  |  Post a Comment
Latest Security News from RSAC 2020
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2020 in San Francisco.
By Dark Reading Staff , 3/3/2020
Comment4 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-04-02
Slack Nebula through 1.1.0 contains a relative path vulnerability that allows a low-privileged attacker to execute code in the context of the root user via tun_darwin.go or tun_windows.go. A user can also use Nebula to execute arbitrary code in the user's own context, e.g., for user-level persistenc...
PUBLISHED: 2020-04-02
Firmware Analysis and Comparison Tool (FACT) 3 has Stored XSS when updating analysis details via a localhost web request, as demonstrated by mishandling of the tags and version fields in helperFunctions/mongo_task_conversion.py.
PUBLISHED: 2020-04-02
install-package through 1.1.6 is vulnerable to Command Injection. It allows execution of arbitrary commands via the device function.
PUBLISHED: 2020-04-02
install-package through 0.4.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
PUBLISHED: 2020-04-02
git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument.