Upcoming Webinars
Webinar Archives
Flash 101: Crash Course on Flash-Based Architectures
Date: Apr 02, 2015
View webinar
Attend this webcast and learn the pros and cons of relevant flash technologies and learn about the latest HGST Flash technology that enables RAC to perform at new levels. We will also review how to choose from among the many alternatives. As a takeaway, you will also receive the white paper "All-Flash Server-Side Storage for Oracle® Real Application Clusters (RAC) on Oracle Linux".

SDN In The Real World
Date: Mar 26, 2015
View webinar
Register for this webinar to learn about market research and customer case studies that showhow SDN has evolved from a concept to a deployable technology that provides real-world value.

Digital Transformation - Priorities, Enablers, Challenges and Benefits
Date: Mar 19, 2015
View webinar
Join us for a webcast to learn about the challenges and obstacles insurers face in their digital journey and how savvy insurers are aligning their digital strategies to digital technology.

DevOps: The Key to Mastering Digital Transformation
Date: Mar 16, 2015
View webinar
Do you need to improve the quality and performance of your applications? What about improving the end customer experience? You're not alone. According to a new UBM study, these are two of top drivers of DevOps, . Join the InformationWeek DevOps Virtual Summit on March 18, 2015 and you can attend and interact with our experts and 100s of your DevOps peers via our robust virtual event platform. We'll also let you in on our survey results so that you can see what challenges and opportunities your peers are dealing with. Register today!

Think you can keep using Windows Server 2003 after July? You're wrong!
Date: Mar 11, 2015
View webinar
Without regular security updates from Microsoft, Windows Server 2003 will become the prime target for hackers who want to exploit this aging OS. Attend this Radio Show and discover why you must upgrade and the choices you have.

Detecting & Preventing Organized Insurance Fraud
Date: Mar 10, 2015
View webinar
Join Insurance & Technology for this webinar and learn about industry leading technology to help you identify and fight organized fraud rings that are costing you money.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-0598
Published: 2015-03-05
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607
Published: 2015-03-05
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0657
Published: 2015-03-05
Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.