Threat Intelligence

3/13/2017
09:00 AM
50%
50%

This Week On Dark Reading: Events Calendar

How to become a threat hunter, how to build a cybersecurity architecture that actually defends against today's risks, and much more...

THIS WEEK: 

Wednesday, March 16 at 1 p.m. Eastern Time: Building a Cybersecurity Architecture to Combat Today's Risks, with Christie Terrill, partner at Bishop Fox. "Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud and the Internet of Things. So how can you combat today’s risks? Attend Wednesday and learn how.

Thursday, March 17 at 1 p.m. Eastern Time: Becoming a Threat Hunter in your Enterprise, with John Sawyer, senior security architect of InGuardians, and Chris Pace, technology advocate for Recorded Future. If you're tired of waiting for your technology to alert you that there’s already a problem, if you want be more proactive, if you want to sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan, then this is the webinar for you.

COMING SOON:

DOWN THE ROAD:

May 15-19: Interop ITX Conference, Las Vegas, MGM Grand Hotel. Online events are great, but nothing beats face time. 

Planning to hit Thursday's webinar, but can't get enough threat hunting? You'll want to hit "Rise of Cyber Hunting: Not Falling Victim to Undetected Breaches," with Kris Lovejoy, president of Acuity Solutions. 

Need to dust off your endpoint security strategy, which hasn't had a good overhaul since you implemented that BYOD policy five years ago? Then don't miss Updating Your Endpoint Security Strategy

Trying to deal with the security skills shortage, and don't have time to wait for the next generation of infosec pros to graduate from university programs that don't even exist yet? Then take a seat in Surviving the Security Skills Shortage, moderated by Dark Reading's own executive editor Kelly Jackson-Higgins, with a panel of security executives from Coca-Cola, Ford, and Microsoft.  

Check out all the sessions in the Interop Security Track. And don't forget about the two-day Dark Reading Cybersecurity Summit -- a great "what you need to know now" refresher for the overworked infosec pro or security crash course for the IT generalists in your life. (Cybersecurity Summit speakers and agenda coming soon.)

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
technicalaccademy
50%
50%
technicalaccademy,
User Rank: Apprentice
3/23/2017 | 1:18:05 AM
Microsoftevents
Thanks for sharing this nice post,it is nice post because of in this calender latest events are updated for total year.everyone knows it for very helpful.once again thanks
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10593
PUBLISHED: 2018-05-24
A vulnerability in DB Manager version 3.0.1.0 and previous and PerformA version 3.0.0.0 and previous allows an authorized user with access to a privileged account on a BD Kiestra system (Kiestra TLA, Kiestra WCA, and InoqulA+ specimen processor) to issue SQL commands, which may result in data corrup...
CVE-2018-10595
PUBLISHED: 2018-05-24
A vulnerability in ReadA version 1.1.0.2 and previous allows an authorized user with access to a privileged account on a BD Kiestra system (Kiestra TLA, Kiestra WCA, and InoqulA+ specimen processor) to issue SQL commands, which may result in loss or corruption of data.
CVE-2018-11332
PUBLISHED: 2018-05-24
Stored cross-site scripting (XSS) vulnerability in the "Site Name" field found in the "site" tab under configurations in ClipperCMS 1.3.3 allows remote attackers to inject arbitrary web script or HTML via a crafted site name to the manager/processors/save_settings.processor.php f...
CVE-2018-8013
PUBLISHED: 2018-05-24
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization.
CVE-2017-17158
PUBLISHED: 2018-05-24
Some Huawei smart phones with the versions before Berlin-L21HNC185B381; the versions before Prague-AL00AC00B223; the versions before Prague-AL00BC00B223; the versions before Prague-AL00CC00B223; the versions before Prague-L31C432B208; the versions before Prague-TL00AC01B223; the versions before Prag...