Upcoming Webinars
Webinar Archives
IoT 105: The Internet of Things as Your Link to Customers
Date: Jun 23, 2015
View webinar
Consider the ways you can support the new customer experience, such as the ability to relate a consumer's activity on your website with their later appearance on in-store proximity beacons. How can you enhance that shopper's experience? Think about ability for a company like GE to optimize the performance and lifespan of a multi-million-dollar piece of heavy equipment at a customer site, improving customer production by 10% or more. How does that translate into customer satisfaction? Then there is the relationship with your own suppliers and trusted business partners. If the IoT allows you to optimize your inventory system, what positive impact in terms of predictability does that have on your own supply partners? This episode will delve deeper into opportunities, highlighting examples that your organization can learn from and emulate.

Conquer the Network Capacity Challenge
Date: Jun 23, 2015
View webinar
This webinar will explore the critical role network monitoring can play in the successful operations of networks in any industry, today and in the future.

IoT 104: Put Internet of Things Data into Action
Date: Jun 18, 2015
View webinar
The value in the Internet of Things will be reflected in business applications that drive new revenue or bring operational efficiencies. It will be up to the analytics team, working closely with business unit leaders and application developers, to turn device data into alert systems for corporate equipment, to identify customer trends, and to build efficiency into inventory and supply systems.

Insider Threat: Hunting for Authorized Evil
Date: Jun 18, 2015
View webinar


Ultimate WAF Torture Test: Bots Attack!
Date: Jun 16, 2015
View webinar
Attend this webinar and learn practical tips on how to defend your web infrastructure against the OWASP Top 10 as well as brute force attacks, web scraping, unauthorized vulnerability scans, fraud, spam and man-in-the-middle attacks.

Hadoop in the Enterprise: Are You Already Behind the Curve?
Date: Jun 16, 2015
View webinar
Join us as we cover the trends in enterprise Hadoop, explains how companies are already seeing value, and provides expert guidance on the various ways that Hadoop can be implemented. We will also present a case study on Hadoop as a Service.

IoT 103: Strategies for Managing & Using All That Data
Date: Jun 16, 2015
View webinar
Don't wait until the data starts to flow before you figure out how you are going to store, organize, analyze, and find value in data. We will discuss how your planning for an IoT initiative can help you identify what data you need -- and what you don't need -- from networked devices, and how you can avoid drowning in data while you gain insight about your operations and your customers. You also will learn about the security risks and best practices related to protecting new types of internal operational data and information derived from customer devices and activity.

IoT 102: The IoT Infrastructure, From Device to Database
Date: Jun 11, 2015
View webinar
The Internet of Things is more than a host of devices pinging a network. The device is just the entry point. We will walk you through some IoT architectures to show how your organization can collect, manage, and integrate device data into applications. We will discuss what pioneering companies have learned about the technologies -- devices, networks, and data management and analytics tools -- the people, and the processes that are critical to an IoT strategy.

IoT, Are you prepared?
Date: Jun 10, 2015
View webinar
Tune in to this webinar for a discussion of the challenges the Internet of Things poses to enterprise networks and advice on how best to prepare for the onslaught.

IoT 101: Find Your Opportunities for the Internet of Things
Date: Jun 09, 2015
View webinar
Let's start with the basics: Learn more about the IoT's adoption cycle, what sets it apart from Machine-to-Machine (M2M) networking, and why the IoT matters to your organization. We will discuss how to identify opportunities for revenue growth and operational efficiencies in the IoT, and how you might focus your IoT initiative. We will examine what separates the enterprise IoT from the consumer portion, and where the two realms intersect.

Can Your Network Handle the Real-time and Cloud Traffic Explosion?
Date: Jun 06, 2015
View webinar
In this webinar, a top expert on network management challenges will be joined by technology leaders from Ipanema Technologies to help you understand how to ensure high quality of service for all your applications.

Let the Cloud take your Contact Center Around the World in 8 Ways
Date: Jun 06, 2015
View webinar
This webinar will guide us through a discussion of cloud communications best practices and tips to achieve these gains in customer experience management, reduce IT costs and improved employee productivity.

Your Endpoints Are Still At Risk - Learn What You Can Do About It
Date: Jun 02, 2015
View webinar
In this webcast, experts offer a look at the emerging trends in endpoint attacks, and make recommendations on technologies and best practices for defending against them.

HowTo: Developing a Data Breach Incident Response Plan
Date: Jun 01, 2015
View webinar
Join Dark Reading Radio and two top security experts for a live, interactive Internet radio program to discuss the critical issue of cyber breach incident response. In the first half of the program, the experts will discuss the key first steps to take when a breach occurs, including data preservation and protection of digital evidence. Don't Miss the event!

Analytics: Your Defense Against Cyber Threats
Date: May 27, 2015
View webinar
Cybersecurity expert Ray Boisvert, who is president and CEO of I-Sec Integrated Strategies (ISECIS) and has more than 30 years of experience in national security, joins All Analytics Radio on Wednesday, May 27, at 2 pm (EDT), to discuss the ongoing cybersecurity threats and how big data analytics can help you tighter your organization's security infrastructure.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2174
Published: 2015-05-24
Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors,...

CVE-2015-0713
Published: 2015-05-24
The web framework in Cisco TelePresence Advanced Media Gateway Series Software before 1.1(1.40), Cisco TelePresence IP Gateway Series Software, Cisco TelePresence IP VCR Series Software before 3.0(1.27), Cisco TelePresence ISDN Gateway Software before 2.2(1.94), Cisco TelePresence MCU Software befor...

CVE-2015-0722
Published: 2015-05-24
The network drivers in Cisco TelePresence T, Cisco TelePresence TE, and Cisco TelePresence TC before 7.3.2 allow remote attackers to cause a denial of service (process restart or device reload) via a flood of crafted IP packets, aka Bug ID CSCuj68952.

CVE-2015-1894
Published: 2015-05-24
Cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2015-1895
Published: 2015-05-24
IBM InfoSphere Optim Workload Replay 2.x before 2.1.0.3 relies on client-side code to verify authorization, which allows remote attackers to bypass intended access restrictions by modifying the client behavior.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.