Upcoming Webinars
Webinar Archives
How to Revolutionize Analytics with Next-Generation In-Memory Computing
Date: Sep 25, 2014
View webinar
Register for this webinar to learn how you can gain a sustainable competitive advantage and take your organization to a new level with IBM?s next generation in-memory computing.

Linking Enterprise and Small Business Security to Shore up Cyber Risks in the Supply Chain
Date: Sep 23, 2014
View webinar
Join SurfWatch Labs Chief Architect and former US Government Intelligence Analyst Jason Polancich, and Carrie Kerskie, a data privacy investigator and expert, for a webcast where they will examine the insecurity of small businesses in the supply chain and provide practical tips to close backdoors into the enterprise.

Data Privacy: 2014 Forrester Survey Results
Date: Sep 17, 2014
View webinar
Register for this webinar to learn about Forrester's survey findings on data security and privacy.

How to Best Manage Customer Service Data Complexity
Date: Sep 17, 2014
View webinar
Register for this webinar to learn how to develop customer portals that deliver on the promise of increased access to policy data around the clock.

Accelerate and Simplify with Next Gen Intel® and Dell server Innovations
Date: Sep 17, 2014
View webinar
Register for this webinar to understand the advantages of the latest Intel® technology that drives the performance of your environment, and Dell server innovation and services that drive application performance to new levels, reduce management complexity and take the risk out of migrating siloed RISC and UNIX systems into open X86 technologies.

How to Overcome Data Obstacles to Grow the Business
Date: Sep 16, 2014
View webinar
By attending this webinar, you will learn why it is so hard for firms to maximize their vast wealth of data and what you can do to overcome these data challenges.

Enabling Hybrid Cloud Solutions to Improve Efficiency
Date: Sep 16, 2014
View webinar
Register for this webinar to learn how to get a grip on cloud complexity with managed services.

Multi-Variant Phishing and the New Reality of Mail-Based Threats
Date: Sep 16, 2014
View webinar
Register for this webinar to learn more about multi-variant phishing and how to protect your company.

Protecting Your Data from Third-Party Vulnerabilities
Date: Sep 15, 2014
View webinar
Cyber attackers are increasingly seeing opportunities for exploiting weaknesses in the ?soft spots? of the supply chain. This webcast will help you find ways to defend your enterprise.

Who's Afraid of the Big (Data) Bad Wolf? Are You?
Date: Nov 09, 2014
View webinar
Attend this webinar to learn about client experiences with Big Data projects, as well as learning about the 5 best practices for big data integration, so that you can tame the big (data) bad wolf.

How to Manage Security-Compromised Endpoints
Date: Nov 09, 2014
View webinar
In this webcast, top experts will discuss steps for remediating infected systems that go beyond simple reimaging of the device. Register for this webinar to gain insight on what steps to take after an infection occurs.

3 Unexpected SaaS Strategies
Date: Nov 09, 2014
View webinar
In this InformationWeek Webcast, we?ll profile some pioneering SaaS deployments and discuss ways attendees can bring that innovative spark to their own companies.

Staying Agile with Big Data - A Roadmap to Long Term Success
Date: Oct 09, 2014
View webinar
Agility is the key for benefiting from the use of Big Data for operational excellence and improved profitability.No matter where you are in the Big Data adoption lifecycle, you will learn about proven methods to open the possibilities of your data.

Is Your Database a Hero or a Zero?
Date: Apr 09, 2014
View webinar
Attend the webcast to learn which database works for you vs. against you. See how the right database architecture can help you achieve your SLAs and give application developers the freedom and flexibility to focus on their code, not the underlying infrastructure.

Data Replication Tools in the Government: Best Practices Revealed
Date: Apr 09, 2014
View webinar
With numerous tools on the market, agencies face challenges identifying the best tools to fit their short- and long-term needs. Register for this webinar to understand the benefits and challenges of data replication and integration tools.

Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0485
Published: 2014-09-02
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.

CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5136
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in Innovative Interfaces Sierra Library Services Platform 1.2_3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.