Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

3/13/2017
09:00 AM
50%
50%

This Week On Dark Reading: Events Calendar

How to become a threat hunter, how to build a cybersecurity architecture that actually defends against today's risks, and much more...

THIS WEEK: 

Wednesday, March 16 at 1 p.m. Eastern Time: Building a Cybersecurity Architecture to Combat Today's Risks, with Christie Terrill, partner at Bishop Fox. "Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud and the Internet of Things. So how can you combat today’s risks? Attend Wednesday and learn how.

Thursday, March 17 at 1 p.m. Eastern Time: Becoming a Threat Hunter in your Enterprise, with John Sawyer, senior security architect of InGuardians, and Chris Pace, technology advocate for Recorded Future. If you're tired of waiting for your technology to alert you that there’s already a problem, if you want be more proactive, if you want to sink your hands into those threat intelligence feeds, dig into those behavioral analytics reports, follow one clue after another after another, until it leads you to a would-be attacker, before they finish carrying out their grand plan, then this is the webinar for you.

COMING SOON:

DOWN THE ROAD:

May 15-19: Interop ITX Conference, Las Vegas, MGM Grand Hotel. Online events are great, but nothing beats face time. 

Planning to hit Thursday's webinar, but can't get enough threat hunting? You'll want to hit "Rise of Cyber Hunting: Not Falling Victim to Undetected Breaches," with Kris Lovejoy, president of Acuity Solutions. 

Need to dust off your endpoint security strategy, which hasn't had a good overhaul since you implemented that BYOD policy five years ago? Then don't miss Updating Your Endpoint Security Strategy

Trying to deal with the security skills shortage, and don't have time to wait for the next generation of infosec pros to graduate from university programs that don't even exist yet? Then take a seat in Surviving the Security Skills Shortage, moderated by Dark Reading's own executive editor Kelly Jackson-Higgins, with a panel of security executives from Coca-Cola, Ford, and Microsoft.  

Check out all the sessions in the Interop Security Track. And don't forget about the two-day Dark Reading Cybersecurity Summit -- a great "what you need to know now" refresher for the overworked infosec pro or security crash course for the IT generalists in your life. (Cybersecurity Summit speakers and agenda coming soon.)

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
technicalaccademy
50%
50%
technicalaccademy,
User Rank: Apprentice
3/23/2017 | 1:18:05 AM
Microsoftevents
Thanks for sharing this nice post,it is nice post because of in this calender latest events are updated for total year.everyone knows it for very helpful.once again thanks
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24119
PUBLISHED: 2021-05-14
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
CVE-2020-27833
PUBLISHED: 2021-05-14
A Zip Slip vulnerability was found in the oc binary in openshift-clients where an arbitrary file write is achieved by using a specially crafted raw container image (.tar file) which contains symbolic links. The vulnerability is limited to the command `oc image extract`. If a symbolic link is first c...
CVE-2021-22866
PUBLISHED: 2021-05-14
A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App o...
CVE-2021-27737
PUBLISHED: 2021-05-14
Apache Traffic Server 9.0.0 is vulnerable to a remote DOS attack on the experimental Slicer plugin.
CVE-2021-32054
PUBLISHED: 2021-05-14
Firely/Incendi Spark before 1.5.5-r4 lacks Content-Disposition headers in certain situations, which may cause crafted files to be delivered to clients such that they are rendered directly in a victim's web browser.