Upcoming Webinars
Webinar Archives
Get Control Over Your Data Quality/Data Governance
Date: Apr 27, 2017
View webinar
AllAnalytics' year-end online poll asking about 2017 goals revealed that your top priority this year is around data quality and data trust. How is your data quality program measuring up so far this year? Attend this radio show and find out!

Research Results Revealed: The State of Analytics
Date: May 01, 2017
View webinar
How does your analytics initiative shape up? Are you keeping pace with your peers in other organizations? Do you have data scientists in lead roles? Are you driving innovation with data? Have you embarked on Internet of Things (IoT) projects? Join All Analytics as we explore the trends our State of Analytics research recently uncovered. Register today!

How Online Attackers Target Your Business - And How to Stop Them
Date: May 03, 2017
View webinar
One of the best ways to develop an effective cyber defense is to think like your attacker and then develop a commensurate response. A professional penetration tester will explain the ways your IT environment actually comes under attack and offer step-by-step recommendations on how you can prevent those attacks.

IT Leader's Guide to the Cybersecurity Landscape
Date: May 11, 2017
View webinar
Thanks to a never-ending stream of major and well-publicized data breaches, security has become one of the most critical issues in IT. Attend this webinar to learn about chief threats that IT organizations face, how they can impact your systems and processes and the extent of the damage they can wreak on your business. Register today!

Psycho-demographic Profiles: Fact, fiction and the future
Date: May 23, 2017
View webinar
Join us as we welcome Michal Kosinski, a psychologist, data scientist, and expert in psycho-demographic profiles to A2 radio. For the uninitiated, these profiles are what Donald Trump, Barak Obama, and Hillary Clinton's presidential campaign organizations all leveraged in their marketing efforts to get out the base on election day. So just what are these profiles and how are they created? Find out when you join us on May 23 at 2 pm ET/11 am PT.

Don't Panic: E-Discovery & the Public Cloud
Date: Jun 01, 2017
View webinar
Don't panic when faced with an E-Discovery request; be prepared. If the court demands your data, it's your job -- not your cloud provider's -- to hand it over. Does your service agreement with your cloud provider include provisions to ensure that they will help you comply with court demands in a timely manner? In this session we'll break down the regulatory and legal compliance issues to be aware of, help you identify contract pitfalls to avoid, and give you the guidance you need to make sure you're prepared next time your organization needs to fulfill an E-Discovery request.

Reduce Security Vulnerabilities in Enterprise Apps
Date: Jun 01, 2017
View webinar
Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Wondering where to start and what to do? This webinar will help you build a comprehensive plan to minimize threats and protect your company.

[Cybersecurity] Understanding Cyber Attackers & Cyber Threats
Date: Jun 21, 2017
View webinar
Today's enterprises are threatened by a broad range of online attackers using an even broader range of electronic exploits. And today's security professionals are faced with two key questions: Who are these cyber attackers and which threats are the most likely to affect their own organization? On June 21, Dark Reading presents a unique, all-day virtual event designed to answer these questions - and many more. Register Today!

Register for Dark Reading Newsletters
White Papers
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.