Upcoming Webinars
Webinar Archives
Don't Hamstring Your Virtual Apps! Remove the Bottleneck with Hyper-convergence
Date: Jul 13, 2015
View webinar
Can your storage technology live up to the demands of your application environment? Deploying and managing shared storage in today's virtualized enterprises must be simpler and easier. Your staff has more important things to do than managing separate systems and mapping LUNs and volumes to VMs Join us for an interactive webcast to learn how hyper-converged compute and storage systems can help get storage under control.

Conquer the Network Capacity Challenge
Date: Jun 23, 2015
View webinar
This webinar will explore the critical role network monitoring can play in the successful operations of networks in any industry, today and in the future.

IoT 105: The Internet of Things as Your Link to Customers
Date: Jun 23, 2015
View webinar
Consider the ways you can support the new customer experience, such as the ability to relate a consumer's activity on your website with their later appearance on in-store proximity beacons. How can you enhance that shopper's experience? Think about ability for a company like GE to optimize the performance and lifespan of a multi-million-dollar piece of heavy equipment at a customer site, improving customer production by 10% or more. How does that translate into customer satisfaction? Then there is the relationship with your own suppliers and trusted business partners. If the IoT allows you to optimize your inventory system, what positive impact in terms of predictability does that have on your own supply partners? This episode will delve deeper into opportunities, highlighting examples that your organization can learn from and emulate.

Insider Threat: Hunting for Authorized Evil
Date: Jun 18, 2015
View webinar


IoT 104: Put Internet of Things Data into Action
Date: Jun 18, 2015
View webinar
The value in the Internet of Things will be reflected in business applications that drive new revenue or bring operational efficiencies. It will be up to the analytics team, working closely with business unit leaders and application developers, to turn device data into alert systems for corporate equipment, to identify customer trends, and to build efficiency into inventory and supply systems.

Making the Most Out Of Threat Intelligence Services
Date: Jun 17, 2015
View webinar
In this informative Dark Reading webcast, experts will offer insights and recommendations on: How to use threat intelligence for maximum benefit How to automate the analysis of threat intelligence data to help identify sophisticated attacks more quickly and efficiently.

Ultimate WAF Torture Test: Bots Attack!
Date: Jun 16, 2015
View webinar
Attend this webinar and learn practical tips on how to defend your web infrastructure against the OWASP Top 10 as well as brute force attacks, web scraping, unauthorized vulnerability scans, fraud, spam and man-in-the-middle attacks.

IoT 103: Strategies for Managing & Using All That Data
Date: Jun 16, 2015
View webinar
Don't wait until the data starts to flow before you figure out how you are going to store, organize, analyze, and find value in data. We will discuss how your planning for an IoT initiative can help you identify what data you need -- and what you don't need -- from networked devices, and how you can avoid drowning in data while you gain insight about your operations and your customers. You also will learn about the security risks and best practices related to protecting new types of internal operational data and information derived from customer devices and activity.

Hadoop in the Enterprise: Are You Already Behind the Curve?
Date: Jun 16, 2015
View webinar
Join us as we cover the trends in enterprise Hadoop, explains how companies are already seeing value, and provides expert guidance on the various ways that Hadoop can be implemented. We will also present a case study on Hadoop as a Service.

IoT 102: The IoT Infrastructure, From Device to Database
Date: Jun 11, 2015
View webinar
The Internet of Things is more than a host of devices pinging a network. The device is just the entry point. We will walk you through some IoT architectures to show how your organization can collect, manage, and integrate device data into applications. We will discuss what pioneering companies have learned about the technologies -- devices, networks, and data management and analytics tools -- the people, and the processes that are critical to an IoT strategy.

VDI Made Easy: how to get, deploy, manage, & maintain a VDI implementation easily & efficiently
Date: Jun 11, 2015
View webinar
Interest in virtual desktop infrastructure (VDI) is rising because it offers a sensible answer to mobility and cloud security woes. Yet the deployment challenges -- including the ability to size for performance, scalability, and adaptability -- seem daunting to many IT organizations. That's about to change. Join us for an interactive discussion of how the rise of "hyperconverged" data center platforms is driving IT leaders to take another look at VDI.

IoT, Are you prepared?
Date: Jun 10, 2015
View webinar
Tune in to this webinar for a discussion of the challenges the Internet of Things poses to enterprise networks and advice on how best to prepare for the onslaught.

IoT 101: Find Your Opportunities for the Internet of Things
Date: Jun 09, 2015
View webinar
Let's start with the basics: Learn more about the IoT's adoption cycle, what sets it apart from Machine-to-Machine (M2M) networking, and why the IoT matters to your organization. We will discuss how to identify opportunities for revenue growth and operational efficiencies in the IoT, and how you might focus your IoT initiative. We will examine what separates the enterprise IoT from the consumer portion, and where the two realms intersect.

Can Your Network Handle the Real-time and Cloud Traffic Explosion?
Date: Jun 06, 2015
View webinar
In this webinar, a top expert on network management challenges will be joined by technology leaders from Ipanema Technologies to help you understand how to ensure high quality of service for all your applications.

Let the Cloud take your Contact Center Around the World in 8 Ways
Date: Jun 06, 2015
View webinar
This webinar will guide us through a discussion of cloud communications best practices and tips to achieve these gains in customer experience management, reduce IT costs and improved employee productivity.

HowTo: Developing a Data Breach Incident Response Plan
Date: Jun 01, 2015
View webinar
Join Dark Reading Radio and two top security experts for a live, interactive Internet radio program to discuss the critical issue of cyber breach incident response. In the first half of the program, the experts will discuss the key first steps to take when a breach occurs, including data preservation and protection of digital evidence. Don't Miss the event!

Your Endpoints Are Still At Risk - Learn What You Can Do About It
Date: Jun 01, 2015
View webinar
In this webcast, experts offer a look at the emerging trends in endpoint attacks, and make recommendations on technologies and best practices for defending against them.

Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: yup
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6628
Published: 2015-05-28
Aruba Networks ClearPass Policy Manager (CPPM) before 6.5.0 allows remote administrators to execute arbitrary code via unspecified vectors.

CVE-2015-1389
Published: 2015-05-28
Cross-site scripting (XSS) vulnerability in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allows remote attackers to inject arbitrary web script or HTML via the username parameter to tips/tipsLoginSubmit.action.

CVE-2015-1392
Published: 2015-05-28
Multiple SQL injection vulnerabilities in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allow remote administrators to execute arbitrary SQL commands via unspecified vectors.

CVE-2015-1550
Published: 2015-05-28
Directory traversal vulnerability in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allows remote administrators to execute arbitrary files via unspecified vectors.

CVE-2015-1551
Published: 2015-05-28
Directory traversal vulnerability in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.4 allows remote administrators to read arbitrary files via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?