Upcoming Webinars
Webinar Archives
7 Diagrams Every Software Professional Should Understand
Date: Oct 21, 2014
View webinar
You?ll deepen your understanding as Steve tackles the seven essential diagrams ? the key to developing sound software engineering judgment. Learn what really affects software projects ? and never be surprised again.

The Future of FedRAMP
Date: Jul 10, 2014
View webinar
This webinar will look at what agencies and service providers can expect from FedRAMP going forward.

Big Data 105: Leveraging Big Data Streams for Advanced Analytics
Date: Mar 10, 2014
View webinar
The most successful and innovative data-driven enterprises are augmenting their own information stores with public and proprietary feeds from social media, marketing firms, government agencies, and more.

Cloud Data Encryption Myths Debunked
Date: Sep 30, 2014
View webinar
Register for this webinar now to learn about a better, smarter approach to data security in the Cloud.

Unleashing Productivity with Mobile Applications
Date: Sep 30, 2014
View webinar
This is the second of three InformationWeek Webinars in a series entitled "Mobilizing the New Millennial Workforce", where we will bring together industry analysts and experts to share their unique perspectives on enterprise mobility, collaboration, unified communications, mobile applications, device management, mobile security and cloud-aware networks.

How Insurers Can Unlock the Value of Relationships
Date: Sep 30, 2014
View webinar
Join Insurance & Technology for a free, one-hour webinar to learn the current best practices for unlocking the value of customer, producer and partner relationships.

Big Data 103: Creating an Enterprise-wide Governance Framework
Date: Sep 26, 2014
View webinar
Data governance is an essential component of an information management initiative, but the complexities are daunting. Which functions should be handled by central IT, and which by business units?

Cloud 105: Cloud Security & Risk
Date: Sep 25, 2014
View webinar
InformationWeek Research has tracked attitudes on cloud security since 2012. In our early surveys, security was a deal-breaker for many companies. Today, the consensus is that every IT service has risk, and big cloud providers can attract and afford scarce security expertise better than many enterprises. In this InformationWeek University session, we?ll discuss the current state of cloud security, unique risks of the cloud and how best to mitigate them, and what IT should expect from a provider.

What can DevOps do for me and my applications?
Date: Sep 25, 2014
View webinar
In this webinar we?ll drill into what DevOps really is and why a movement focused on improving operations can help you as a developer.

Big Data 102: The Right Data Infrastructure
Date: Sep 24, 2014
View webinar
To leverage big data and analytics effectively, companies must create an environment that organizes structured, unstructured, internal, and external data effectively and processes that data efficiently.

Real-Time Risk Analytics for Financial Services: A Guide
Date: Sep 24, 2014
View webinar
Register for this webinar to uncover techniques and best practices for detecting and identifying risk in real-time, focusing on how advanced analysis of IT data can help firms manage their exposure in the three areas of technology, financial and security risk.

Cloud 104: Cloud Orchestration
Date: Sep 23, 2014
View webinar
The use of public cloud ? IaaS and SaaS but also PaaS ? and the rise of DevOps should lend some urgency to the concept of orchestration. The ultimate goal: Define and automatically execute services to meet business needs without human intervention. In this InformationWeek University session, we?ll examine the essential elements of orchestration and explore what the future may hold.

Leveraging Analytics to Build a Data-Driven Insurance Enterprise
Date: Sep 23, 2014
View webinar
During this session, you?ll learn how to leverage effective data management practices and achieve business growth by gaining greater customer insight, improving client interactions, and strengthening risk portfolios.

How to Increase Software Dev Team Efficiency with a Virtual Private Cloud
Date: Sep 23, 2014
View webinar
Register for this webinar to learn the value a collaborative lifecycle management solution can provide software development teams -- as much as a 522% ROI in 3 years.

Empowering Employees with Mobility and Collaboration
Date: Sep 23, 2014
View webinar
This is the first of three Information Week Webinars in a series entitled ?Mobilizing the New Millennial Workforce?, where we will bring together industry analysts and experts to share their unique perspectives on enterprise mobility, collaboration, unified communications, mobile applications, device management, mobile security and cloud-aware networks.

Cloud 103: The Rise Of CloudOps
Date: Sep 19, 2014
View webinar
You?ve heard of DevOps. Now get ready for CloudOps. The concept: Bring IT operations into the cloud era. In this InformationWeek University session, we?ll discuss how CloudOps can help IT build an agile, self-service infrastructure with instant deployment and guard against lock-in.

Using Predictive Analytics to Take Banking Relationships to the Next Level
Date: Sep 19, 2014
View webinar
Join Bank Systems & Technology for a free 60-minute video webinar to learn about how banks can apply advanced predictive analytics across this organization.

Enterprise Class Storage for Mid-sized Deployments
Date: Sep 19, 2014
View webinar
Register for this webinar to learn how performance-optimized, affordable, all-flash solutions can improve your business productivity and cut costs.

Managing Your Mobility Beyond BYOD
Date: Sep 18, 2014
View webinar
Register for this webinar to learn more about successful implementation of managed mobility services and how you can utilize managed mobility services.

What is the Orchestrated Datacenter?
Date: Sep 18, 2014
View webinar
Join Andy Mackay and Muneer Mubashir as they discuss what the Orchestrated Data Center really is.

Top 5 Reasons to Switch to a Better Firewall
Date: Sep 18, 2014
View webinar
Register for this webinar to understand the factors you should consider when selecting your next firewall.

Cloud 102: Late To The Cloud? No Problem
Date: Sep 18, 2014
View webinar
Adopting a cloud mindset isn?t about IT relinquishing all control and just approving invoices. It's about changing legacy ways of delivering business services and doing sales, customer service, and end user support in new and more flexible ways. In this InformationWeek University session, we?ll help late cloud bloomers get the basics right, including choosing pilot projects, selecting partners, and building in automation and orchestration right from the start.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0560
Published: 2014-09-17
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.

CVE-2014-0561
Published: 2014-09-17
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0567.

CVE-2014-0562
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."

CVE-2014-0563
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors.

CVE-2014-0565
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0566.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant