DRTV
Advanced Persistent Threats: What Are They, Really?
Advanced Persistent Threats: What Are They, Really?
Dark Reading Videos  |  4/4/2014  | 
There seem to be as many definitions of APT as there are actual APTs. So what is an advanced persistent threat, really?
What Is The FIDO Alliance?
What Is The FIDO Alliance?
Dark Reading Videos  |  4/2/2014  | 
Phillip Dunkelberger of Nok Nok Labs explains why its proposed specifications will transform computing.
Top Advice for CISOs
Top Advice for CISOs
Dark Reading Videos  |  3/31/2014  | 
Some of the soft skills are the hardest ones for CISOs to deploy.
Richard Clarke: Snowden Should Be in Prison
Richard Clarke: Snowden Should Be in Prison
Dark Reading Videos  |  3/28/2014  | 
Former White House cybersecurity advisor says Edward Snowden has jeopardized the United States' national security.
Welcome To The New Dark Reading
Welcome To The New Dark Reading
Dark Reading Videos  |  3/27/2014  | 
Check out Dark Reading's Tim Wilson and Kelly Jackson Higgins talking about the reason behind the re-launch.
Richard Clarke: Foreign Governments Not So Surprised by US Snooping
Richard Clarke: Foreign Governments Not So Surprised by US Snooping
Dark Reading Videos  |  3/27/2014  | 
Former White House cybersecurity advisor thinks foreign governments' outrage is largely an act.
Finally, Plug & Play Authentication!
Finally, Plug & Play Authentication!
Dark Reading Videos  |  3/26/2014  | 
FIDO Alliance technology will allow enterprises to replace passwords with plug-and-play multifactor authentication.
How to Solve the Security Skills Shortage
How to Solve the Security Skills Shortage
Dark Reading Videos  |  3/26/2014  | 
At RSA, security professionals weighed in on how to close the security skills gap -- if there is one -- and solve staffing problems.
Why FIDO Alliance Standards Will Kill Passwords
Why FIDO Alliance Standards Will Kill Passwords
Dark Reading Videos  |  2/18/2014  | 
Phillip Dunkelberger of Nok Nok Labs tells why the time is finally ripe for a password-free computing experience.
Why FIDO Alliance Standards Will Kill Passwords
Why FIDO Alliance Standards Will Kill Passwords
Dark Reading Videos  |  2/17/2014  | 
Phillip Dunkelberger of Nok Nok Labs tells why the time is finally ripe for a password-free computing experience.
How & Why Cloud Security Will Empower Users
How & Why Cloud Security Will Empower Users
Dark Reading Videos  |  1/27/2014  | 
Cloud computing growth means big changes for enterprises of all sizes and in all markets.
How & Why Cloud Security Will Empower Users
How & Why Cloud Security Will Empower Users
Dark Reading Videos  |  1/24/2014  | 
Cloud computing growth means big changes for enterprises of all sizes and in all markets.
What Next-Gen Security Looks Like
What Next-Gen Security Looks Like
Dark Reading Videos  |  12/9/2013  | 
The nightmare of BYOD is giving rise to a new generation of intelligent, highly scalable security products and platforms.
What Next-Gen Security Looks Like
What Next-Gen Security Looks Like
Dark Reading Videos  |  12/2/2013  | 
The nightmare of BYOD is giving rise to a new generation of intelligent, highly scalable security products and platforms.
BYOD Network & Security at GITEX 2013, Dubai
BYOD Network & Security at GITEX 2013, Dubai
Dark Reading Videos  |  10/28/2013  | 
Asfar Zaidi of Huawei Enterprise talks about the latest BYOD solutions in the industry.
NSA Director Speaks Out About Agency's Newly Revealed Surveillance Programs
NSA Director Speaks Out About Agency's Newly Revealed Surveillance Programs
Dark Reading Videos  |  8/9/2013  | 
Gen. Keith Alexander told Black Hat USA attendees how leaked surveillance programs helped derail specific terror plots
Appthority & The Mobile Enterprise
Appthority & The Mobile Enterprise
Dark Reading Videos  |  10/9/2012  | 
Some of the most innovative new enterprise technologies come from start-ups, but doing business with them can be risky, given their unproven products and short track records. With Anthony Bettini, Co-Founder and CEO of Appthority.
McAfee Adds Scale, VMWare Support To Security Platform
McAfee Adds Scale, VMWare Support To Security Platform
Dark Reading Videos  |  5/8/2012  | 
McAfee announced three new additions to its security family at Interop in Las Vegas this week, including an improvement in performance and scalability, and some enhancements to its support for virtual environments.
Anatomy of a Zero Day Attack
Anatomy of a Zero Day Attack
Dark Reading Videos  |  10/1/2011  | 
Pacific Northwest National Laboratory CIO, Jerry Johnson, provides some lessons learned from the attacks on his organization in July -- a highly publicized attack on an organization that provides cyber security services for the Dept. of Engergy.
WhisperCore Mitigates Risks Of Android In Businesses
WhisperCore Mitigates Risks Of Android In Businesses
Dark Reading Videos  |  8/11/2011  | 
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.
MANDIANT CSO Talks Threats To His Company and His Clients
MANDIANT CSO Talks Threats To His Company and His Clients
Dark Reading Videos  |  8/10/2011  | 
Richard Bejtlich, CSO and VP of managed services, sits down with Dark Reading's Kelly Jackson Higgins at Black Hat USA to talk about the two hats he wears at the incident response company, and trends in attacks against enterprises and security firms.


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If you’re still focused on securing endpoints, you’ve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web