Upcoming Webinars
Webinar Archives
IoT 105: The Internet of Things as Your Link to Customers
Date: Jun 23, 2015
View webinar
Consider the ways you can support the new customer experience, such as the ability to relate a consumer's activity on your website with their later appearance on in-store proximity beacons. How can you enhance that shopper's experience? Think about ability for a company like GE to optimize the performance and lifespan of a multi-million-dollar piece of heavy equipment at a customer site, improving customer production by 10% or more. How does that translate into customer satisfaction? Then there is the relationship with your own suppliers and trusted business partners. If the IoT allows you to optimize your inventory system, what positive impact in terms of predictability does that have on your own supply partners? This episode will delve deeper into opportunities, highlighting examples that your organization can learn from and emulate.

Conquer the Network Capacity Challenge
Date: Jun 23, 2015
View webinar
This webinar will explore the critical role network monitoring can play in the successful operations of networks in any industry, today and in the future.

IoT 104: Put Internet of Things Data into Action
Date: Jun 18, 2015
View webinar
The value in the Internet of Things will be reflected in business applications that drive new revenue or bring operational efficiencies. It will be up to the analytics team, working closely with business unit leaders and application developers, to turn device data into alert systems for corporate equipment, to identify customer trends, and to build efficiency into inventory and supply systems.

Insider Threat: Hunting for Authorized Evil
Date: Jun 18, 2015
View webinar


Ultimate WAF Torture Test: Bots Attack!
Date: Jun 16, 2015
View webinar
Attend this webinar and learn practical tips on how to defend your web infrastructure against the OWASP Top 10 as well as brute force attacks, web scraping, unauthorized vulnerability scans, fraud, spam and man-in-the-middle attacks.

Hadoop in the Enterprise: Are You Already Behind the Curve?
Date: Jun 16, 2015
View webinar
Join us as we cover the trends in enterprise Hadoop, explains how companies are already seeing value, and provides expert guidance on the various ways that Hadoop can be implemented. We will also present a case study on Hadoop as a Service.

IoT 103: Strategies for Managing & Using All That Data
Date: Jun 16, 2015
View webinar
Don't wait until the data starts to flow before you figure out how you are going to store, organize, analyze, and find value in data. We will discuss how your planning for an IoT initiative can help you identify what data you need -- and what you don't need -- from networked devices, and how you can avoid drowning in data while you gain insight about your operations and your customers. You also will learn about the security risks and best practices related to protecting new types of internal operational data and information derived from customer devices and activity.

IoT 102: The IoT Infrastructure, From Device to Database
Date: Jun 11, 2015
View webinar
The Internet of Things is more than a host of devices pinging a network. The device is just the entry point. We will walk you through some IoT architectures to show how your organization can collect, manage, and integrate device data into applications. We will discuss what pioneering companies have learned about the technologies -- devices, networks, and data management and analytics tools -- the people, and the processes that are critical to an IoT strategy.

IoT, Are you prepared?
Date: Jun 10, 2015
View webinar
Tune in to this webinar for a discussion of the challenges the Internet of Things poses to enterprise networks and advice on how best to prepare for the onslaught.

IoT 101: Find Your Opportunities for the Internet of Things
Date: Jun 09, 2015
View webinar
Let's start with the basics: Learn more about the IoT's adoption cycle, what sets it apart from Machine-to-Machine (M2M) networking, and why the IoT matters to your organization. We will discuss how to identify opportunities for revenue growth and operational efficiencies in the IoT, and how you might focus your IoT initiative. We will examine what separates the enterprise IoT from the consumer portion, and where the two realms intersect.

Can Your Network Handle the Real-time and Cloud Traffic Explosion?
Date: Jun 06, 2015
View webinar
In this webinar, a top expert on network management challenges will be joined by technology leaders from Ipanema Technologies to help you understand how to ensure high quality of service for all your applications.

Let the Cloud take your Contact Center Around the World in 8 Ways
Date: Jun 06, 2015
View webinar
This webinar will guide us through a discussion of cloud communications best practices and tips to achieve these gains in customer experience management, reduce IT costs and improved employee productivity.

Your Endpoints Are Still At Risk - Learn What You Can Do About It
Date: Jun 02, 2015
View webinar
In this webcast, experts offer a look at the emerging trends in endpoint attacks, and make recommendations on technologies and best practices for defending against them.

HowTo: Developing a Data Breach Incident Response Plan
Date: Jun 01, 2015
View webinar
Join Dark Reading Radio and two top security experts for a live, interactive Internet radio program to discuss the critical issue of cyber breach incident response. In the first half of the program, the experts will discuss the key first steps to take when a breach occurs, including data preservation and protection of digital evidence. Don't Miss the event!

Analytics: Your Defense Against Cyber Threats
Date: May 27, 2015
View webinar
Cybersecurity expert Ray Boisvert, who is president and CEO of I-Sec Integrated Strategies (ISECIS) and has more than 30 years of experience in national security, joins All Analytics Radio on Wednesday, May 27, at 2 pm (EDT), to discuss the ongoing cybersecurity threats and how big data analytics can help you tighter your organization's security infrastructure.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0750
Published: 2015-05-22
The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786.

CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.