09:30 PM

Interop New York 2013: Complete Coverage

Articles leading up to, live coverage from, and post-event analysis of Interop New York 2013

>> Embrace Your Inner Risk Adviser
Bridging the gap between security and IT and the business side requires teamwork on building a risk profile

>> At Interop, Plethora Of New Services Leaves Questions About Risk
GRC tools may offer security, risk answers as enterprises rely more heavily on service providers

>> 5 Lessons From Real-World Attacks
Tales from the trenches show that even small organizations are in the bull's eye

>> Cisco CEO: Internet Of Things Will Reshape IT
Internet-connected devices will drive a new IT infrastructure that must support an "application economy," predicts Cisco CEO John Chambers, speaking at Interop

>> CISO Shares Strategies For Surviving The Inevitability Of Attacks
Loop in application, network teams to help spot threats and attacks before they do harm

>> Reaping The Security Rewards Of SDN
Software-defined network will be a major theme for Interop -- here's why some experts believe security pros should be paying attention

>> Rise Of The 'Hit-And-Run' APT
A new model of cyberespionage is emerging that relies on cybermercenaries hired to break in, steal information, and then leave -- with specific targeted information

>> Protecting The Network From Bring-Your-Own Vulnerabilities
Companies that allow employees to use their own devices for work inherit their employees' vulnerabilities. How should companies secure networks in the age of BYOD?

>> 5 Steps To Stop A Snowden Scenario
The NSA leaks by a systems administrator have forced enterprises to rethink their risks of an insider leak and their privileged users' access

>> Penetration Testing For Beginners
Interop workshop instructor discusses what it takes for networking pros to start wrapping their arms around security testing basics

>> Q&A: Security In The Spotlight At Interop
Chair of Interop's Risk Management and Security Track John Pironti talks risk management and what to expect at the upcoming conference

>> Phishers Expand Brands, Shift Gears
More brands than ever getting phished as cybercriminals branch out and rely less on mass phishing attacks

>> Three Steps To Securing Businesses In A Post-Signature World
From fully-undetectable malware to low-volume targeted trojans, digital threats frequently do not have a signature, but companies can still prepare

>> 12 Must-Attend Interop Events
Interop New York is just around the corner. The show is packed with informative sessions and workshops. Here are a dozen to put on your schedule

>> Interop New York Sponsors & Exhibitors Launch New Products & Services

>> Register For Interop New York 2013

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/22/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.