Upcoming Webinars
Webinar Archives
Flash 101: Crash Course on Flash-Based Architectures
Date: Apr 02, 2015
View webinar
Attend this webcast and learn the pros and cons of relevant flash technologies and learn about the latest HGST Flash technology that enables RAC to perform at new levels. We will also review how to choose from among the many alternatives. As a takeaway, you will also receive the white paper "All-Flash Server-Side Storage for Oracle® Real Application Clusters (RAC) on Oracle Linux".

SDN In The Real World
Date: Mar 26, 2015
View webinar
Register for this webinar to learn about market research and customer case studies that showhow SDN has evolved from a concept to a deployable technology that provides real-world value.

Digital Transformation - Priorities, Enablers, Challenges and Benefits
Date: Mar 19, 2015
View webinar
Join us for a webcast to learn about the challenges and obstacles insurers face in their digital journey and how savvy insurers are aligning their digital strategies to digital technology.

DevOps: The Key to Mastering Digital Transformation
Date: Mar 16, 2015
View webinar
Do you need to improve the quality and performance of your applications? What about improving the end customer experience? You're not alone. According to a new UBM study, these are two of top drivers of DevOps, . Join the InformationWeek DevOps Virtual Summit on March 18, 2015 and you can attend and interact with our experts and 100s of your DevOps peers via our robust virtual event platform. We'll also let you in on our survey results so that you can see what challenges and opportunities your peers are dealing with. Register today!

Think you can keep using Windows Server 2003 after July? You're wrong!
Date: Mar 11, 2015
View webinar
Without regular security updates from Microsoft, Windows Server 2003 will become the prime target for hackers who want to exploit this aging OS. Attend this Radio Show and discover why you must upgrade and the choices you have.

Detecting & Preventing Organized Insurance Fraud
Date: Mar 10, 2015
View webinar
Join Insurance & Technology for this webinar and learn about industry leading technology to help you identify and fight organized fraud rings that are costing you money.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8617
Published: 2015-03-04
Cross-site scripting (XSS) vulnerability in the Web Action Quarantine Release feature in the WebGUI in Fortinet FortiMail before 4.3.9, 5.0.x before 5.0.8, 5.1.x before 5.1.5, and 5.2.x before 5.2.3 allows remote attackers to inject arbitrary web script or HTML via the release parameter to module/re...

CVE-2015-0891
Published: 2015-03-04
Cross-site scripting (XSS) vulnerability in Maroyaka CGI Maroyaka Simple Board allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2015-0892
Published: 2015-03-04
Cross-site scripting (XSS) vulnerability in Maroyaka CGI Maroyaka Image Album allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2015-0893
Published: 2015-03-04
Cross-site scripting (XSS) vulnerability in Maroyaka CGI Maroyaka Relay Novel allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2015-2209
Published: 2015-03-04
DLGuard 4.5 allows remote attackers to obtain the installation path via the c parameter to index.php.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.