Upcoming Webinars
Webinar Archives
How Do You Choose the Right PaaS Provider?
Date: Dec 12, 2014
View webinar
If you run many different development environments, as is common in large organizations across the spectrum, is there even a single PaaS that you could use? Our instructor will guide attendees through these and other decision points.

Public vs. Private: When to Run Your Own PaaS
Date: Dec 11, 2014
View webinar
Enterprise IT teams can run a private PaaS system locally that launches servers on the public cloud, or they can run a public PaaS that launches servers on a private cloud. Different development environments, regulatory regimes, and use cases drive different PaaS requirements, as our instructor will explain.

Do You Know the Many Flavors of PaaS?
Date: Dec 10, 2014
View webinar
Because PaaS is about automating and orchestrating software deployments, it's important to note that there are as many flavors of PaaS as there are software development environments, especially in large shops that may serve various constituencies.

Extend Laptop Lifecycles, Increase Employee Productivity, AND Reduce IT Costs
Date: Dec 09, 2014
View webinar
Register for this webinar to learn how to effortlessly realize substantial savings by upgrading from HDDs to SSDs on your endpoints.

The Cost of DevOps & How PaaS Solves It
Date: Dec 09, 2014
View webinar
With infrastructure as a service, it is now possible to automate essentially all basic systems administration through software and configuration.

Platform-As-A-Service: 101 - A Live University Session
Date: Dec 08, 2014
View webinar
Our instructor will explain how PaaS attempts to remove those inefficiencies and minimize errors by abstracting and automating the nitty-gritty details of software deployment.

Indexing for Better Search Performance: A Guide
Date: Dec 05, 2014
View webinar
In this discussion we will outline how database indexes can be implemented to optimize search performance and enable you to uncover valuable insights into your data.

Indexing for Better Search Performance
Date: Dec 05, 2014
View webinar
Indexes are the key to optimizing database performance--and uncovering valuable insights into your data. Government agencies and private companies rely on indexes to drive large scale applications. This session explores examples from the FAA, Fairfax County and other organizations and covers The Universal Index, foreign language search and indexing, stemming, word query, range indexes and more.

Search Rescue: Build It In
Date: Dec 04, 2014
View webinar
Search built into the database is a key driver in enabling data management in a world of semi-structured and unstructured, constantly changing data sources. Using examples from the FAA, Fairfax County, as well as the private sector, this session analyzes the importance of search and explains key concepts, including relevancy, grammar, facets and constraints, reverse queries, and more.

How to Build Search into Your Database
Date: Dec 04, 2014
View webinar
In this discussion we will see how having search built into the database is a key driver in enabling a schema agnostic approach to data management in today's world of semi-structured and unstructured, constantly changing data sources.

Achieving Resiliency: Building in High Availability and Disaster Recovery
Date: Dec 03, 2014
View webinar
In a data-driven, always on society, outages and data loss can have consequences far beyond a temporary inconvenience. The concepts in this session explain how to build an environment capable of both high availability and disaster recovery, including specific government examples (including Healthcare.gov and ITAM) where these capabilities have proven critical.

How to Build a High Availability & Disaster Recovery Environment
Date: Dec 03, 2014
View webinar
In this discussion we build upon the concepts discussed in the Technical Architecture presentation to apply those concepts to building an environment capable of both High Availability and Disaster Recovery, and specific government examples where these capabilities have proven critical.

Setting Up for Success: Architectural Considerations for NoSQL Databases
Date: Dec 02, 2014
View webinar
Massive quantities of data demand architectures built to handle the scale. This discussion explores the configuration and operation of clusters and explains the different roles of application servers, databases, forests and tiered storage. Examples from state and federal implementations show how to achieve the scalability required in a variety of government settings.

NoSQL Database Architecture: Best Practices Revealed
Date: Dec 02, 2014
View webinar
In this discussion we will explore the technical components of the MarkLogic Architecture in order to describe how clusters operate and are configured to handle today's massive data demands.

The Big (Data) Picture: NoSQL in Government Agencies
Date: Dec 01, 2014
View webinar
The amount and variety of data has outpaced traditional technologies. Meanwhile, mandates for online services and the drive for increased efficiency continue challenge agencies to manage data better - and use the insights it can provide. That's why many agencies are turning to newer approaches to managing data, including NoSQL databases.

NoSQL and Big Data in the Government: What You Need to Know
Date: Dec 01, 2014
View webinar
In this discussion we will look at several government use cases for MarkLogic technology as well as introduce MarkLogic as the Enterprise NoSQL database today's big data challenges.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1421
Published: 2014-11-25
mountall 1.54, as used in Ubuntu 14.10, does not properly handle the umask when using the mount utility, which allows local users to bypass intended access restrictions via unspecified vectors.

CVE-2014-3605
Published: 2014-11-25
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-6407. Reason: This candidate is a reservation duplicate of CVE-2014-6407. Notes: All CVE users should reference CVE-2014-6407 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2014-7839
Published: 2014-11-25
DocumentProvider in RESTEasy 2.3.7 and 3.0.9 does not configure the (1) external-general-entities or (2) external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors.

CVE-2014-8001
Published: 2014-11-25
Buffer overflow in decode.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.

CVE-2014-8002
Published: 2014-11-25
Use-after-free vulnerability in decode_slice.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?