Dark Reading is part of the Informa Tech Division of Informa PLC

7x彩票网appThis site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

News & Commentary
Startup Offering Secure Access to Corporate Apps Emerges from Stealth
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Axis Security has raised $17 million in VC funding.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/17/2020
Comment0 comments  |  Read  |  Post a Comment
Remote Workforce Jumps 15% In Two Weeks
Dark Reading Staff, Quick Hits
Netskope reports the total number of remote employees is the highest it has ever observed.
By Dark Reading Staff , 3/17/2020
Comment1 Comment  |  Read  |  Post a Comment
What Cybersecurity Pros Really Think About Artificial Intelligence
Ericka Chickowski, Contributing Writer
While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.
By Ericka Chickowski Contributing Writer, 3/13/2020
Comment0 comments  |  Read  |  Post a Comment
CASB 101: Why a Cloud Access Security Broker Matters
Curtis Franklin Jr., Senior Editor at Dark Reading
A CASB isn't a WAF, isn't an NGF, and isn't an SWG. So what is it, precisely, and why do you need one to go along with all the other letters? Read on for the answer.
By Curtis Franklin Jr. Senior Editor at Dark Reading, 3/12/2020
Comment0 comments  |  Read  |  Post a Comment
Cyberspace Solarium Commission Slams US Cybersecurity Readiness
Dark Reading Staff, Quick Hits
The federal commission outlined more than 60 recommendations to remedy major security problems.
By Dark Reading Staff , 3/11/2020
Comment0 comments  |  Read  |  Post a Comment
COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready?
Kelly Sheridan, Staff Editor, Dark ReadingNews
A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.
By Kelly Sheridan Staff Editor, Dark Reading, 3/11/2020
Comment1 Comment  |  Read  |  Post a Comment
Cyber Resiliency, Cloud & the Evolving Role of the Firewall
PJ Kirner, CTO & Founder, IllumioCommentary
Today's defenses must be creative in both isolating threats and segmenting environments to prevent attacks. Here's why.
By PJ Kirner CTO & Founder, Illumio, 3/9/2020
Comment0 comments  |  Read  |  Post a Comment
Threat Awareness: A Critical First Step in Detecting Adversaries
Dan Schiappa, Executive Vice President & Chief Product Officer at SophosCommentary
One thing seems certain: Attackers are only getting more devious and lethal. Expect to see more advanced attacks.
By Dan Schiappa Executive Vice President & Chief Product Officer at Sophos, 3/9/2020
Comment0 comments  |  Read  |  Post a Comment
7 Cloud Attack Techniques You Should Worry About
Kelly Sheridan, Staff Editor, Dark Reading
Security pros detail the common and concerning ways attackers target enterprise cloud environments.
By Kelly Sheridan Staff Editor, Dark Reading, 3/6/2020
Comment0 comments  |  Read  |  Post a Comment
Gotta Patch 'Em All? Not Necessarily, Experts Say
Kelly Sheridan, Staff Editor, Dark ReadingNews
When it's impossible to remediate all vulnerabilities in an organization, data can indicate which bugs should be prioritized.
By Kelly Sheridan Staff Editor, Dark Reading, 3/3/2020
Comment0 comments  |  Read  |  Post a Comment
How Security Leaders at Starbucks and Microsoft Prepare for Breaches
Kelly Sheridan, Staff Editor, Dark ReadingNews
Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.
By Kelly Sheridan Staff Editor, Dark Reading, 3/2/2020
Comment0 comments  |  Read  |  Post a Comment
6 Truths About Disinformation Campaigns
Jai Vijayan, Contributing Writer
Disinformation goes far beyond just influencing election outcomes. Here's what security pros need to know.
By Jai Vijayan Contributing Writer, 2/28/2020
Comment2 comments  |  Read  |  Post a Comment
'Cloud Snooper' Attack Circumvents AWS Firewall Controls
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
Possible nation-state supply chain attack that cheated both cloud and on-premise firewalls acts like a "wolf in sheep's clothing," Sophos says.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/27/2020
Comment0 comments  |  Read  |  Post a Comment
Ensure Your Cloud Security Is as Modern as Your Business
Nicolas (Nico) Fischbach, Global CTO at ForcepointCommentary
Take a comprehensive approach to better protect your organization. Security hygiene is a must, but also look at your risk posture through a data protection lens.
By Nicolas (Nico) Fischbach Global CTO at Forcepoint, 2/25/2020
Comment0 comments  |  Read  |  Post a Comment
McAfee Acquires Light Point for Browser Isolation Tech
Dark Reading Staff, Quick Hits
Company plans to integrate Light Point Security's technology into the McAfee Secure Web Gateway and its Mvision UCE platform.
By Dark Reading Staff , 2/25/2020
Comment0 comments  |  Read  |  Post a Comment
Security, Networking Collaboration Cuts Breach Cost
Kelly Sheridan, Staff Editor, Dark ReadingNews
CISOs report increases in alert fatigue and the number of records breached, as well as the struggle to secure mobile devices in a new Cisco study.
By Kelly Sheridan Staff Editor, Dark Reading, 2/24/2020
Comment0 comments  |  Read  |  Post a Comment
Enterprise Cloud Use Continues to Outpace Security
Kelly Sheridan, Staff Editor, Dark ReadingNews
Nearly 60% of IT and security pros say deployment of business services in the cloud has rushed past their ability to secure them.
By Kelly Sheridan Staff Editor, Dark Reading, 2/24/2020
Comment0 comments  |  Read  |  Post a Comment
Solving the Cloud Data Security Conundrum
Faiyaz Shahpurwala, Chief Product and Strategy Officer for FortanixCommentary
Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.
By Faiyaz Shahpurwala Chief Product and Strategy Officer for Fortanix, 2/24/2020
Comment0 comments  |  Read  |  Post a Comment
All About SASE: What It Is, Why It's Here, How to Use It
Kelly Sheridan, Staff Editor, Dark ReadingNews
Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments.
By Kelly Sheridan Staff Editor, Dark Reading, 2/22/2020
Comment1 Comment  |  Read  |  Post a Comment
Security Now Merges With Dark Reading
Tim Wilson, Editor in Chief, Dark Reading, News
Readers of Security Now will join the Dark Reading community, gaining access to a wide range of cybersecurity content.
By Tim Wilson, Editor in Chief, Dark Reading , 2/21/2020
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Many Ransomware Attacks Can be Stopped Before They Begin
Jai Vijayan, Contributing Writer,  3/17/2020
This Tax Season, Save the Scorn and Protect Customers from Phishing Scams
Dr. Salvatore Stolfo, Founder & CTO, Allure Security,  3/17/2020
Remote Workforce Jumps 15% In Two Weeks
Dark Reading Staff 3/17/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
7x彩票网app Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database

PUBLISHED: 2020-03-18
A vulnerability was found in Moodle through version 3.6 before 3.6.7 and 3.7 before 3.7.3, where tokens used to fetch inline atachments in email notifications were not disabled when a user's account was no longer active. Note: to access files, a user would need to know the file path, and their token...

PUBLISHED: 2020-03-18
A vulnerability was found in Moodle through versions 3.7 before 3.73, 3.6 before 3.6.7 and 3.5 before 3.5.9, where a reflected XSS possible from some fatal error messages.

PUBLISHED: 2020-03-18
Delta Industrial Automation CNCSoft ScreenEditor, v1.00.96 and prior. Multiple stack-based buffer overflows can be exploited when a valid user opens a specially crafted, malicious input file.

PUBLISHED: 2020-03-18
Zulip Desktop before 4.0.3 loaded untrusted content in an Electron webview with web security disabled, which can be exploited for XSS in a number of ways. This especially affects Zulip Desktop 2.3.82.

PUBLISHED: 2020-03-18
A vulnerability was found in moodle through 3.7 to 3.7.2 and before 3.7.3, where there is blind XSS reflected in some locations where user email is displayed.
66?????? 7072???? 7073???? 689????? 963???? 66????? 7073???? 7073???? 66???app 8????app