Upcoming Webinars
Webinar Archives
Make Your Storage Keep Up with Your Virtual Apps
Date: May 29, 2015
View webinar
Join us for an interactive webcast to learn how hyper-converged compute and storage systems can help get storage under control.

[Financial Services] Successful Data Control in an Always-On World
Date: May 20, 2015
View webinar
In this webinar, we examine what it takes to optimally and securely integrate and control financial data flows throughout the enterprise and beyond.

[The Human Factor 2015] Cybercriminals Go Corporate - How to Fight Them
Date: May 20, 2015
View webinar
Last year was the year attackers "went corporate" by changing their tactics to focus on businesses rather than consumers, exploiting middle management overload of information sharing, and trading off attack volume for sophistication. Attend this webinar to learn more!

[ROI] Is Public Cloud Always Cheaper?
Date: May 19, 2015
View webinar
Attend this webinar for an in-depth look at the IT evolution of digital media companies from start-up through success, and the important considerations surrounding long-term ROI in the public cloud.

Has your Cyber Security Program Jumped the Shark?
Date: May 19, 2015
View webinar
Learn how to make your security program relevant in 2015 and beyond. Join technology trend-setter Stephen Newman, VP of Product Management at Damballa, for a live discussion about the use of advanced detection techniques to find unknown and hidden threats.

Meet Evolving Business Demands with Software-Defined Storage
Date: May 19, 2015
View webinar
Businesses are beginning to discover the advantages of a software-defined storage approach - one that accelerates the delivery of storage resources in today's complex and dynamic infrastructures. Attend this webinar to learn more!

The DevOps Edge: Application Performance Management
Date: May 13, 2015
View webinar
In this webcast, we'll examine the latest trends and success stories in digital transformation, agile development and IT operations, and DevOps tools and techniques. We'll be joined by CA's Tony Davis who will explain the value of a vendor partnership in achieving the best end-user experience in terms of application quality and performance.

Traditional vs. Modern SIEM
Date: May 13, 2015
View webinar
This webinar will outline your options when investing in a SIEM, the data you will need to feed a SIEM and how to know whether it is cloud-ready.

Is the cloud casting a shadow over your IT?...Get back in control!
Date: May 13, 2015
View webinar
Register for this 60 minute session as Chris Christiansen, Program VP for IDC's Security Product & Services Group, and Chris Webber, Security Strategist from Centrify discuss: - The realities of shadow IT - Tools & techniques to get back in control of cloud apps and mobile devices - Strategies to get out in front of line of business

Digital Insurance: Tips for a Successful Migration
Date: May 12, 2015
View webinar
One of the toughest challenges for the insurance market is the adoption of digital technology. However companies need to make digitization a priority in order to retain customers and improve their experience. But what does digital really mean? How will it impact how insurance companies communicate and collaborate with policyholders? How will insurance companies work with partners and employees alike? Attend this webinar to learn more!

SSDs: a Better Value than HDDs?
Date: May 11, 2015
View webinar
Join our industry experts for this interactive webinar to learn how to stop spending money on 15k HDDs. Solid State Drives (SSDs) reduce power and cooling costs, save on racks, enclosures and cabling all while improving performance and reliability.

Streamline Communications, Boost Your Bottom Line
Date: May 07, 2015
View webinar
Join us for this interactive webinar to learn how unified communications and collaboration services can improve your employees' responsiveness and your business bottom line.

Why DDoS Attacks Are A More Serious Threat Than Ever
Date: May 05, 2015
View webinar
Neustar's annual DDoS Attacks Report presents the latest critical DDoS trending data from real companies across industries. Learn how companies are ramping up their DDoS protection tactics and why they are working.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.