Upcoming Webinars

Webinar Archives
Virtual Event: Building a Cyber Defense for 2019
Date: Dec 12, 2018
View webinar
At this Dark Reading virtual event, security practitioners, industry visionaries, and technology developers come together to discuss the key changes to expect in the next 12 months - and how you can prepare for them.

Cyber Threat Intelligence Inside Your Organization
Date: Nov 14, 2018
View webinar
In this webinar, learn about the tools that can help your internal threat intelligence gathering, how to fine-tune your monitoring efforts, and how efforts like these could help you detect attackers and defend your business.

10 Emerging Threats to Today's Enterprise Applications
Date: Nov 08, 2018
View webinar
In this Dark Reading webinar, application security experts offer a look at some of the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft. The experts also offer some practical advice on how to identify these threats and vulnerabilities in your organization - and how to secure your applications to limit the impact of an application-focused attack.

The Insider Threat: Real Defense for Real Businesses
Date: Nov 07, 2018
View webinar
How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place? In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business.

The Network of the Future is Powered by AI
Date: Nov 01, 2018
View webinar
In this webinar, the CIO of Dartmouth, Mitch Davis, is joined by experts from Mist and Juniper to describe how AI-driven networks are boosting the user experience at the esteemed Ivy League college and the lessons that enterprise IT can learn from their implementation.

Lambda Architecture with In-Memory Technology
Date: Oct 31, 2018
View webinar
To meet existing and future needs, organizations need a new kind of data warehouse that can handle both kinds of data processing: batch workloads for traditional reporting, as well as real-time or near-real-time streaming data. For this, they need a data warehouse of the future based on Lambda architecture.

SOC Evolution: How and Why to Update Your Security Operations Center
Date: Oct 30, 2018
View webinar
In this webinar, learn the benefits of updating your security operations center and get recommendations on how to implement the essential tools and practices of a next-gen SOC.

Is Your Email Authentication Technology Really Automated?
Date: Oct 25, 2018
View webinar
Attend this webinar and you'll learn the reality of DNS as a legacy system, where the manual process goes wrong and why enforcement matters.

How Headless CMS Fits into Modern Web Architectures
Date: Oct 24, 2018
View webinar
Many traditional Web Content Management (WCM) and CMS vendors are providing headless content delivery options as a way to support web and non-website experiences. Are you looking at how to integrate your WCM/CMS tools with a modern approach to web development and omnichannel content delivery? Are you interested in getting a review of architectural options to leverage your investment in Experience Management/WCM/CMS systems? If so, then this webinar is for you.

Purple Team Tactics & TI for Effectively Training Your Cybersecurity Team
Date: Oct 23, 2018
View webinar
Find out how purple team tactics and tactical threat intelligence can be used to enhance your security team's capabilities against the next-generation cyber-attacks.

6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
4 Ways to Fight the Email Security Threat
Asaf Cidon, Vice President, Content Security Services, at Barracuda Networks,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.