Upcoming Webinars
Webinar Archives
Assessing, Analyzing and Addressing Cybersecurity Threats Cost-Effectively
Date: Jul 23, 2015
View webinar
Banks face constantly evolving cyber security threats, driving the need for vigilance, deep threat assessments and associated risk analysis of critical IT and network infrastructures. Leveraging a services provider, with dedicated and experienced managed security and analytics capabilities, helps banks cover their own resource gaps and build a secure, compliant environment in which to operate.

Intelligence-driven Incident Response
Date: Jul 21, 2015
View webinar
In this webinar, top cybersecurity experts will discuss how incident responders can make faster, better-informed decisions using new tools and techniques applied to existing systems and data.

Is Your Organization Ready for the Future?
Date: Jul 20, 2015
View webinar
To serve the customer of the future, financial institutions must unlock the wealth of information trapped within bank, credit card, investment statements and other documents. Financial information has to be incorporated into flexible formats that empower mobile and web apps to provide the right information and the right insights, at the right time and place. Register today to learn how to develop a competitive advantage by preparing for the digital future.

Tips for Implementing a Successful Multi-Cloud Strategy
Date: Jul 16, 2015
View webinar
Most start-ups are "born" in the public cloud - meaning they turn to it for inherent flexibility, scalability and low costs out of the gate. But what happens when success hits and IT infrastructure needs grow exponentially? A single-faceted approach to the cloud may not work for the long haul. Register today and learn more.

IoT: The Software Supply Chain & Cybersecurity
Date: Jul 15, 2015
View webinar
As enterprises increasingly rely on digital technology to drive their businesses, CISOs and CIOs must begin to understand the direction and critical implications of cybersecurity for the IoT. Join Dark Reading for this live-streamed videocast featuring two of the industry's best-known voices to learn more.

Myths of Cloud Security Debunked!
Date: Jul 14, 2015
View webinar
Join Michael Sutton, CISO, Zscaler, for a compelling webcast debunking the top myths of cloud security. Michael will also provide concrete steps you can take to keep your organization safe in today's cloud and mobile first IT landscape.

Don't Hamstring Your Virtual Apps! Remove the Bottleneck with Hyper-convergence
Date: Jul 13, 2015
View webinar
Can your storage technology live up to the demands of your application environment? Deploying and managing shared storage in today's virtualized enterprises must be simpler and easier. Your staff has more important things to do than managing separate systems and mapping LUNs and volumes to VMs Join us for an interactive webcast to learn how hyper-converged compute and storage systems can help get storage under control.

The New School of Cyber Defense
Date: Jul 09, 2015
View webinar
The new school of cyber defense calls for security that is agile and intelligent. It emphasizes protecting the interactions between our users, our applications and our data. Attend this webinar to learn more!

Flash for MySQL: Increase Performance & Lower Costs
Date: Jul 08, 2015
View webinar
Register for this webinar and learn how to employ a simple, yet effective change to physical MySQL deployments to reduce server count up to 50%!

Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: nice post
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1750
Published: 2015-07-01
Open redirect vulnerability in nokia-mapsplaces.php in the Nokia Maps & Places plugin 1.6.6 for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the href parameter to page/place.html. NOTE: this was originally reported as cross-sit...

CVE-2014-1836
Published: 2015-07-01
Absolute path traversal vulnerability in htdocs/libraries/image-editor/image-edit.php in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the image_path parameter in a cancel action.

CVE-2015-0848
Published: 2015-07-01
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.

CVE-2015-1330
Published: 2015-07-01
unattended-upgrades before 0.86.1 does not properly authenticate packages when the (1) force-confold or (2) force-confnew dpkg options are enabled in the DPkg::Options::* apt configuration, which allows remote man-in-the-middle attackers to upload and execute arbitrary packages via unspecified vecto...

CVE-2015-1950
Published: 2015-07-01
IBM PowerVC Standard Edition 1.2.2.1 through 1.2.2.2 does not require authentication for access to the Python interpreter with nova credentials, which allows KVM guest OS users to discover certain PowerVC credentials and bypass intended access restrictions via unspecified Python code.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report