Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:30 PM

Interop New York 2013: Complete Coverage

Articles leading up to, live coverage from, and post-event analysis of Interop New York 2013

>> Embrace Your Inner Risk Adviser
Bridging the gap between security and IT and the business side requires teamwork on building a risk profile

>> At Interop, Plethora Of New Services Leaves Questions About Risk
GRC tools may offer security, risk answers as enterprises rely more heavily on service providers

>> 5 Lessons From Real-World Attacks
Tales from the trenches show that even small organizations are in the bull's eye

>> Cisco CEO: Internet Of Things Will Reshape IT
Internet-connected devices will drive a new IT infrastructure that must support an "application economy," predicts Cisco CEO John Chambers, speaking at Interop

>> CISO Shares Strategies For Surviving The Inevitability Of Attacks
Loop in application, network teams to help spot threats and attacks before they do harm

>> Reaping The Security Rewards Of SDN
Software-defined network will be a major theme for Interop -- here's why some experts believe security pros should be paying attention

>> Rise Of The 'Hit-And-Run' APT
A new model of cyberespionage is emerging that relies on cybermercenaries hired to break in, steal information, and then leave -- with specific targeted information

>> Protecting The Network From Bring-Your-Own Vulnerabilities
Companies that allow employees to use their own devices for work inherit their employees' vulnerabilities. How should companies secure networks in the age of BYOD?

>> 5 Steps To Stop A Snowden Scenario
The NSA leaks by a systems administrator have forced enterprises to rethink their risks of an insider leak and their privileged users' access

>> Penetration Testing For Beginners
Interop workshop instructor discusses what it takes for networking pros to start wrapping their arms around security testing basics

>> Q&A: Security In The Spotlight At Interop
Chair of Interop's Risk Management and Security Track John Pironti talks risk management and what to expect at the upcoming conference

>> Phishers Expand Brands, Shift Gears
More brands than ever getting phished as cybercriminals branch out and rely less on mass phishing attacks

>> Three Steps To Securing Businesses In A Post-Signature World
From fully-undetectable malware to low-volume targeted trojans, digital threats frequently do not have a signature, but companies can still prepare

>> 12 Must-Attend Interop Events
Interop New York is just around the corner. The show is packed with informative sessions and workshops. Here are a dozen to put on your schedule

>> Interop New York Sponsors & Exhibitors Launch New Products & Services

>> Register For Interop New York 2013

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-20
** DISPUTED ** The BIOS configuration design on ASUS ROG Zephyrus M GM501GS laptops with BIOS 313 relies on the main battery instead of using a CMOS battery, which reduces the value of a protection mechanism in which booting from a USB device is prohibited. Attackers who have physical laptop access ...
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.