Upcoming Webinars
Webinar Archives
How to Prep for Millennials Being the Decision Makers, Are You Ready?
Date: Aug 30, 2016
View webinar
Millennials know exactly what they want and expectations are high - very high. They are empowered in their personal life and demand the same in business. Because they are always on and always connected, using everything from mobile devices to social networks, Millennials expect each touchpoint to be as productive as any other - especially in business. No exceptions, no excuses. The discerning nature of Millennials challenges every company as they occupy an ever larger share of customer bases and workforces. Join us for this enlightening three-part virtual event, sponsored by Interactive Intelligence, where analysts from Forrester and Frost & Sullivan will aid us in exploring this revolutionary generation through the lens of our customers and employees. Closing out the event, we'll also explore whether technology can become future-proof as an outcome of this digital revolution.

Digital Transformation & the 6 Key Trends Shaping Digital Banking
Date: Aug 23, 2016
View webinar


Protect Yourself from Antivirus
Date: Aug 17, 2016
View webinar
Traditional antivirus (AV) is not the solution to breach prevention on the endpoint - it's the problem. In fact, conventional AV no longer offers any real security value. To prevent security breaches, you must protect yourself not only from known and unknown cyber threats, but also from the failures of any traditional AV solutions deployed in your environment.

Prioritizing & Responding To Security Threats In Real Time
Date: Aug 16, 2016
View webinar


Pros, Cons, & Considerations to Implementation Approaches
Date: Aug 11, 2016
View webinar
In this webinar, leading industry analyst Zeus Kerravala discusses the pros and cons of various SD-WAN security architectural approaches, and considerations for choosing the best approach for your implementation. Join us and you will get a review of approaches to securing your WAN environments, learn how to build a secure WAN infrastructure with SD-WAN, get an opportunity to have your SD-WAN questions answered.

The State of Ransomware: 2016 Survey Findings
Date: Aug 10, 2016
View webinar
Ransomware has become one of the biggest cyber security threats in the world, with instances of ransomware in exploit kits increasing about 44% in the last six months. According to FBI statistics, hackers extorted business and institutions for more than $209 million in ransomware payments in the first three months of 2016. The business of ransomware is on pace to be a $1 billion a year crime. Join us to learn about the most impacted industries, common attack vectors, and overall impact on businesses.

A Look at Tomorrow's Data Scientist
Date: Aug 09, 2016
View webinar
Join All Analytics Radio on Tuesday, August 9, at 11 am EDT, to discuss how universities, employers, and even students are defining the role and characteristics of tomorrow's data scientist, and how that data scientist can support the analytics initiatives of the corporate world, and to learn more about how your organization can help to develop the data scientists who will help to make your organization a data-driven business.

How to Use Threat Intelligence to Improve Your Security Operations
Date: Jul 28, 2016
View webinar
Over the past year, many enterprises have begun to collect and analyze IT security threat data through a new range of threat intelligence feeds and services. But what should the IT organization do when it uncovers potential threats? How can IT and security organizations quickly digest this threat data and turn it into an operational response? This process of "operationalizing" threat intelligence is the key to getting the most out of this new range of services.

Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.