Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

News & Commentary
COVID-19: Getting Ready for the Next Business Continuity Challenge
Steve Winterfeld, Advisory CISO at AkamaiCommentary
What comes after you've empowered your remote workforce in the wake of the coronavirus pandemic? Dealing with a large portion of that workforce getting sick at the same time.
By Steve Winterfeld Advisory CISO at Akamai, 3/25/2020
Comment1 Comment  |  Read  |  Post a Comment
From Zero to Hero: CISO Edition
Mike Convertino, Chief Security Officer at Arceo.aiCommentary
It's time for organizations to realize that an empowered CISO can effectively manage enterprise risk and even grow the business along the way.
By Mike Convertino Chief Security Officer at Arceo.ai, 3/23/2020
Comment0 comments  |  Read  |  Post a Comment
Dark Reading Cybersecurity Crossword Puzzle
Edge Editors, Dark Reading
Here's a little something to snuggle up with if you're on lockdown.
By Edge Editors Dark Reading, 3/20/2020
Comment1 Comment  |  Read  |  Post a Comment
Achieving DevSecOps Requires Cutting Through the Jargon
Mario DiNatale, Head of Platform Security. ZeroNorthCommentary
Establishing a culture where security can work easily with developers starts with making sure they can at least speak the same language.
By Mario DiNatale Head of Platform Security. ZeroNorth, 3/19/2020
Comment2 comments  |  Read  |  Post a Comment
What the Battle of Britain Can Teach Us About Cybersecurity's Human Element
Eyal Benishti, CEO & Founder of IRONSCALESCommentary
During WWII, the British leveraged both technology and human intelligence to help win the war. Security leaders must learn the lessons of history and consider how the human element can make their machine-based systems more effective.
By Eyal Benishti CEO & Founder of IRONSCALES, 3/18/2020
Comment0 comments  |  Read  |  Post a Comment
4 Ways Thinking 'Childishly' Can Empower Security Professionals
Michal Bar, Head of Cybersecurity Professional Services at CylusCommentary
Younger minds -- more agile and less worried by failure -- provide a useful model for cyber defenders to think more creatively.
By Michal Bar Head of Cybersecurity Professional Services at Cylus, 3/16/2020
Comment1 Comment  |  Read  |  Post a Comment
What Cybersecurity Pros Really Think About Artificial Intelligence
Ericka Chickowski, Contributing Writer
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.
By Ericka Chickowski Contributing Writer, 3/13/2020
Comment1 Comment  |  Read  |  Post a Comment
Working from Home? These Tips Can Help You Adapt
Andy Ellis, Chief Security Officer, AkamaiCommentary
COVID-19 means many people are doing their jobs from outside the confines of the office. That may not be as easy as it sounds.
By Andy Ellis Chief Security Officer, Akamai, 3/12/2020
Comment0 comments  |  Read  |  Post a Comment
Back to the Future: A Threat Intelligence Journey
Michelle Alvarez, Manager, Threat Intelligence Production Team, IBM X-Force IRISCommentary
Threat intelligence needs the problem solvers, the curious ones, the mission seekers, the analytical minds, the defenders, and the fierce -- whatever their gender.
By Michelle Alvarez Manager, Threat Intelligence Production Team, IBM X-Force IRIS, 3/12/2020
Comment0 comments  |  Read  |  Post a Comment
Gender Equality in Cybersecurity Could Drive Economic Boost
Dark Reading Staff, Quick Hits
If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.
By Dark Reading Staff , 3/11/2020
Comment0 comments  |  Read  |  Post a Comment
3 Tips to Stay Secure When You Lose an Employee
Bil Harmer​, CISO & Chief Evangelist at SecureAuthCommentary
Whether they leave for a better job or get fired, and whether they mean to cause problems or do so out of ignorance, ex-workers can pose a threat to your company.
By Bil Harmer​ CISO & Chief Evangelist at SecureAuth, 3/10/2020
Comment0 comments  |  Read  |  Post a Comment
Keys to Hiring Cybersecurity Pros When Certification Can't Help
Curtis Franklin Jr., Senior Editor at Dark Reading
There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/10/2020
Comment1 Comment  |  Read  |  Post a Comment
Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading
The former Supreme Allied Commander of NATO gives Dark Reading his take on the greatest cyberthreats our nation and its businesses face today.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/6/2020
Comment0 comments  |  Read  |  Post a Comment
Securing Our Elections Requires Change in Technology, People & Attitudes
Earl D. Matthews, Senior Vice President and Chief Strategy Officer at VerodinCommentary
Increasing security around our election process and systems will take a big effort from many different parties. Here's how.
By Earl D. Matthews Senior Vice President and Chief Strategy Officer at Verodin, 3/6/2020
Comment0 comments  |  Read  |  Post a Comment
CISOs Who Want a Seat at the DevOps Table Better Bring Value
John Worrall, Chief Executive Officer at ZeroNorthCommentary
Here are four ways to make inroads with the DevOps team -- before it's too late.
By John Worrall Chief Executive Officer at ZeroNorth, 3/4/2020
Comment0 comments  |  Read  |  Post a Comment
Latest Security News from RSAC 2020
Dark Reading Staff, News
Check out Dark Reading's updated, exclusive coverage of the news and security themes that are dominating RSA Conference 2020 in San Francisco.
By Dark Reading Staff , 3/3/2020
Comment4 comments  |  Read  |  Post a Comment
Educating Educators: Microsoft's Tips for Security Awareness Training
Kelly Sheridan, Staff Editor, Dark ReadingNews
Microsoft's director of security education and awareness shares his approach to helping train employees in defensive practices.
By Kelly Sheridan Staff Editor, Dark Reading, 2/28/2020
Comment1 Comment  |  Read  |  Post a Comment
US State Dept. Shares Insider Tips to Fight Insider Threats
Kelly Sheridan, Staff Editor, Dark ReadingNews
The insider threat is a technology, security, and personnel issue, officials said in explaining an approach that addresses all three factors.
By Kelly Sheridan Staff Editor, Dark Reading, 2/26/2020
Comment0 comments  |  Read  |  Post a Comment
Commonsense Security: Leveraging Dialogue & Collaboration for Better Decisions
Dr. Zvi Guterman, CEO, CloudShareCommentary
Sometimes, good old-fashioned tools can help an enterprise create a cost-effective risk management strategy.
By Dr. Zvi Guterman CEO, CloudShare, 2/26/2020
Comment0 comments  |  Read  |  Post a Comment
Cybersecurity Industry: It's Time to Stop the Victim Blame Game
Jessica Smith, Senior Vice President,  The Crypsis GroupCommentary
There are far more ways to be helpful than adding to the noise of what a company probably did wrong.
By Jessica Smith Senior Vice President, The Crypsis Group, 2/25/2020
Comment5 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.