Upcoming Webinars
Webinar Archives
7 Diagrams Every Software Professional Should Understand
Date: Oct 21, 2014
View webinar
You?ll deepen your understanding as Steve tackles the seven essential diagrams ? the key to developing sound software engineering judgment. Learn what really affects software projects ? and never be surprised again.

The Future of FedRAMP
Date: Jul 10, 2014
View webinar
This webinar will look at what agencies and service providers can expect from FedRAMP going forward.

Big Data 105: Leveraging Big Data Streams for Advanced Analytics
Date: Mar 10, 2014
View webinar
The most successful and innovative data-driven enterprises are augmenting their own information stores with public and proprietary feeds from social media, marketing firms, government agencies, and more.

Cloud Data Encryption Myths Debunked
Date: Sep 30, 2014
View webinar
Register for this webinar now to learn about a better, smarter approach to data security in the Cloud.

Unleashing Productivity with Mobile Applications
Date: Sep 30, 2014
View webinar
This is the second of three InformationWeek Webinars in a series entitled "Mobilizing the New Millennial Workforce", where we will bring together industry analysts and experts to share their unique perspectives on enterprise mobility, collaboration, unified communications, mobile applications, device management, mobile security and cloud-aware networks.

How Insurers Can Unlock the Value of Relationships
Date: Sep 30, 2014
View webinar
Join Insurance & Technology for a free, one-hour webinar to learn the current best practices for unlocking the value of customer, producer and partner relationships.

Big Data 103: Creating an Enterprise-wide Governance Framework
Date: Sep 26, 2014
View webinar
Data governance is an essential component of an information management initiative, but the complexities are daunting. Which functions should be handled by central IT, and which by business units?

Cloud 105: Cloud Security & Risk
Date: Sep 25, 2014
View webinar
InformationWeek Research has tracked attitudes on cloud security since 2012. In our early surveys, security was a deal-breaker for many companies. Today, the consensus is that every IT service has risk, and big cloud providers can attract and afford scarce security expertise better than many enterprises. In this InformationWeek University session, we?ll discuss the current state of cloud security, unique risks of the cloud and how best to mitigate them, and what IT should expect from a provider.

What can DevOps do for me and my applications?
Date: Sep 25, 2014
View webinar
In this webinar we?ll drill into what DevOps really is and why a movement focused on improving operations can help you as a developer.

Big Data 102: The Right Data Infrastructure
Date: Sep 24, 2014
View webinar
To leverage big data and analytics effectively, companies must create an environment that organizes structured, unstructured, internal, and external data effectively and processes that data efficiently.

Real-Time Risk Analytics for Financial Services: A Guide
Date: Sep 24, 2014
View webinar
Register for this webinar to uncover techniques and best practices for detecting and identifying risk in real-time, focusing on how advanced analysis of IT data can help firms manage their exposure in the three areas of technology, financial and security risk.

How to Increase Software Dev Team Efficiency with a Virtual Private Cloud
Date: Sep 23, 2014
View webinar
Register for this webinar to learn the value a collaborative lifecycle management solution can provide software development teams -- as much as a 522% ROI in 3 years.

Can You Live Without Service Virtualization?
Date: Sep 23, 2014
View webinar
Can you live without Service Virtualization? Technology applications are essential to your business today, yet time?to?market, development costs, componentized software, and perceived application quality remain challenges to successful application delivery. Service virtualization enables organizations to build and test required business systems at lower cost with speed and quality.

Empowering Employees with Mobility and Collaboration
Date: Sep 23, 2014
View webinar
This is the first of three Information Week Webinars in a series entitled ?Mobilizing the New Millennial Workforce?, where we will bring together industry analysts and experts to share their unique perspectives on enterprise mobility, collaboration, unified communications, mobile applications, device management, mobile security and cloud-aware networks.

Cloud 104: Cloud Orchestration
Date: Sep 23, 2014
View webinar
The use of public cloud ? IaaS and SaaS but also PaaS ? and the rise of DevOps should lend some urgency to the concept of orchestration. The ultimate goal: Define and automatically execute services to meet business needs without human intervention. In this InformationWeek University session, we?ll examine the essential elements of orchestration and explore what the future may hold.

Leveraging Analytics to Build a Data-Driven Insurance Enterprise
Date: Sep 23, 2014
View webinar
During this session, you?ll learn how to leverage effective data management practices and achieve business growth by gaining greater customer insight, improving client interactions, and strengthening risk portfolios.

Big Data 101: Getting the House in Order
Date: Sep 22, 2014
View webinar
For most enterprises, data storage and analytics are remarkably fragmented. Departmental siloes lead to a lack of standardized definitions and multiple versions of the truth, ad-hoc business intelligence operations lead to duplicated efforts, and immature processes lead to valuable datasets languishing in obscurity.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2006-1318
Published: 2014-09-19
Microsoft Office 2003 SP1 and SP2, Office XP SP3, Office 2000 SP3, Office 2004 for Mac, and Office X for Mac do not properly parse record lengths, which allows remote attackers to execute arbitrary code via a malformed control in an Office document, aka "Microsoft Office Control Vulnerability."

CVE-2012-2588
Published: 2014-09-19
Multiple cross-site scripting (XSS) vulnerabilities in MailEnable Enterprise 6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) From, (2) To, or (3) Subject header or (4) body in an SMTP e-mail message.

CVE-2012-6659
Published: 2014-09-19
Cross-site scripting (XSS) vulnerability in the admin interface in Phorum before 5.2.19 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-1391
Published: 2014-09-19
QT Media Foundation in Apple OS X before 10.9.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file with RLE encoding.

CVE-2014-3614
Published: 2014-09-19
Unspecified vulnerability in PowerDNS Recursor (aka pdns_recursor) 3.6.x before 3.6.1 allows remote attackers to cause a denial of service (crash) via an unknown sequence of malformed packets.

Best of the Web
Dark Reading Radio