Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinar Archives

Upcoming Webinars
Unlocking the Ultimate Source of Truth in Cloud SecurityNetwork Data
Date: Nov 19, 2020

View archived webinar

Learn how virtual taps from AWS, Azure, and Google Cloud enable network detection and response (NDR) solutions to help secure cloud environments with agentless and immutable monitoring and threat detection capabilities. Invisible to attackers, NDR solutions sit out of band and analyze network traffic streams to provide crucial information about devices, users, and potential attacks that other security tools simply can’t. Best-of-breed NDR also augments security personnel visibility into SSL/TLS 1.3 encrypted traffic and ML-driven threat detection that alerts only on items that matter while providing intelligence to remediation and forensic workflows.

Cyber Attackers Favorite Exploits and How to Stop Them
Date: Nov 12, 2020

View archived webinar

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you.

Cyber Attackers Favorite Exploits and How to Stop Them
Date: Nov 12, 2020

View archived webinar

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you.

Cyber Attackers Favorite Exploits And How to Stop Them
Date: Nov 12, 2020

View archived webinar

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Cyber Attackers’ Favorite Exploits – And How to Stop Them -- a free, all-day online conference produced by the editors of Dark Reading -- offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered at Cyber Attackers’ Favorite Exploits: And How to Stop Them:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
  • Details on some of the simplest and most common tricks for cracking enterprise systems and networks
  • Methods for recognizing and mitigating frequently-used online cyber exploits
  • Advice on how to use threat intelligence to prevent trending attacks
  • A look at emerging methods to frustrate and deceive online attackers
  • Recommendations on how to analyze information on emerging exploits, and how to develop a response plan

 

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them -- then this virtual event is for you. Register today!

SecDevOps: Tying Security to Your Application Development Processes
Date: Nov 11, 2020

View archived webinar

For many application development teams, the concept of DevOps is changing the way software is developed, written, and run. But how does your app dev team build security into its processes? In this webinar, experts discuss the integration of security and DevOps – sometimes called SecDevOps or DevSecOps – and how it can make your applications not only more flexible, but more secure. You’ll also get advice on how to bring your security team and app dev team together through common tools and practices that foster secure code development.

Using Artificial Intelligence, Deep Learning and Machine Learning for Cyber Defense
Date: Nov 03, 2020

View archived webinar

A new wave of machine learning, deep learning, and artificial intelligence technology promises to help IT security operations teams detect cyber threats sooner and respond to them more quickly. But machine learning is used in a wide variety of ways, and not all machine learning-based products work in the same fashion. In this webinar, experts will discuss the ways that these technologies can help in security operations, how they can speed threat analysis, and how to evaluate and choose technologies that will work in your organization.

The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You
Date: Oct 20, 2020

View archived webinar

With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn't going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will.

Join him as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about.

Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.

Automating Security Functions in Your Enterprise
Date: Oct 15, 2020

View archived webinar

A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? How does emerging automation technology work, and how can security teams implement it in a way that is both effective and secure? In this webinar, top experts offer insights on how to make automation work for your security team.

Effective Cyber Risk Assessment and Measurement
Date: Oct 06, 2020

View archived webinar

The perils of security breaches are widely publicized, but do you know exactly how an attack or breach would affect your business? Learn about the costs associated with today’s threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to prioritize costs and defense strategies specifically for your environment.

Effective Cyber Risk Assessment and Measurement
Date: Oct 06, 2020

View archived webinar

The perils of security breaches are widely publicized, but do you know exactly how an attack or breach would affect your business? Learn about the costs associated with today’s threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to prioritize costs and defense strategies specifically for your environment.

Get Your Security Tools Talking for More Effective Incident Response
Date: Sep 24, 2020

View archived webinar

How your team responds to an incident has a tremendous impact on the outcome. But with the average organization using dozens upon dozens of security tools, each with its own alerts, interfaces, and logins, it can be tough to respond to incidents quickly. How do you manage a well-orchestrated, repeatable and effective incident response in the midst of tool chaos and a changing threat landscape? Join this webinar with Jake Gillen, SOAR Engineer, and Julie Rockett, Senior Product Marketing Manager, as they show you what and how to automate within incident response while also making your security toolset more effective.

Get Your Security Tools Talking for More Effective Incident Response
Date: Sep 24, 2020

View archived webinar

How your team responds to an incident has a tremendous impact on the outcome. But with the average organization using dozens upon dozens of security tools, each with its own alerts, interfaces, and logins, it can be tough to respond to incidents quickly. How do you manage a well-orchestrated, repeatable and effective incident response in the midst of tool chaos and a changing threat landscape? Join this webinar with Jake Gillen, SOAR Engineer, and Julie Rockett, Senior Product Marketing Manager, as they show you what and how to automate within incident response while also making your security toolset more effective.

Deception: The Next Step In Cyber Defense
Date: Sep 22, 2020

View archived webinar

All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they’ve gotten your crown jewels? In this webinar, experts discuss emerging tools and strategies for cyber threat deception, which enables you to put your attackers into a juicy-looking, yet bogus environment that keeps them away from your actual data.

Deception: The Next Step In Cyber Defense
Date: Sep 22, 2020

View archived webinar

All organizations have tools and strategies for keeping attackers out. But what if you could distract and frustrate attackers by making them *think* they’ve gotten your crown jewels? In this webinar, experts discuss emerging tools and strategies for cyber threat deception, which enables you to put your attackers into a juicy-looking, yet bogus environment that keeps them away from your actual data.

Implementing an Effective Defense Against Ransomware
Date: Sep 16, 2020

View archived webinar

Ransomware has become one of the fastest-growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar will answer these questions and many more, providing  expert advice on how to stop ransomware from infecting your critical systems and data --and what to do if your defenses fail.

Staffing and Training a Cyber Incident Response Team
Date: Sep 15, 2020

View archived webinar

Today’s enterprises are under attack. Whether it’s malware, ransomware, social engineering, or targeted exploits, security teams must be ready to detect these cyber attacks, analyze the threat, and launch a quick and effective response. Is your organization ready?

There are a wide variety of IT security tools available for cyber incident response. But most organizations have discovered that it’s people – the analysts and technicians who make up the cyber response team – that provide the key knowledge needed to recognize the exploits and instigate critical actions in the event of a cybersecurity incident.

Building and Refining Threat Hunting Practices in Your Enterprise
Date: Aug 19, 2020

View archived webinar

Today’s sophisticated cyber attackers have found many ways to evade traditional perimeter defenses and launch exploits that lay for months, even years, without detection. In response, many enterprises have launched threat hunting tools and processes that proactively seek out malware and attackers lurking in the enterprise IT environment. What’s the best way to make threat hunting work in your organization? In this instructive webinar, experts join Dark Reading editors to offer advice and recommendations on threat hunting, and how to optimize its effectiveness in enterprise cyber defense.

Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim?
Date: Aug 18, 2020

View archived webinar

There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

Why Security-Minded Companies Are Transitioning to DevSecOps
Date: Aug 11, 2020

View archived webinar

For too long, developers have had to weigh the tradeoffs between software security and feature development. But as DevSecOps continues to gain momentum over application security, organizations realize that adopting security in software development needn't be a drag on productivity, says Tim Mackey from the Synopsys Cybersecurity Research Center.

 

Filmed for the Dark Reading News Desk at Black Hat Virtual. For the full News Desk programming schedule, see DarkReading.com/DRnewsdesk.

 

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, ... View Full Bio

Securing Active Directory the Way it Deserves
Date: Aug 11, 2020

View archived webinar

Credential theft and lateral movement are now regular, everyday tricks of the cyber attacker trade. So it’s imperative that every business secure the foundations of its enterprise access control system: Active Directory. And yet, for many organizations, Active Directory management and security is a major challenge, and they don’t know where to begin. In this webinar, experts will explain the latest AD-related threats and help you get your new or legacy AD in order so you’re prepared for them.

Making Zero-Trust Work for Work From Home
Date: Aug 05, 2020

View archived webinar

When organizations abruptly sent vast numbers of employees home, their carefully planned security architectures were faced with major new challenges. Precious corporate endpoint devices sent to unfamiliar locations, connecting to routers that use default passwords, and sharing space with unsecured IoT devices. Is a zero-trust security architecture even possible in a situation like this? In this Dark Reading webinar, learn how to make layered, zero-trust architecture work among today’s business realities.  

How Secure is Your Azure Cloud Environment?
Date: Jul 31, 2020

View archived webinar

Join Revolutionary Security cloud experts to learn how to protect your Microsoft Azure environment. We'll explore real examples of industry issues, changes in the landscape of cloud security, and the most significant dangers currently impacting Microsoft Azure. Get recommendations you can immediately put into practice to protect your critical assets in the cloud and a roadmap for increasing your cloud security posture. 

Protecting Mobile Apps and APIs from the Inside Out
Date: Jul 29, 2020

View archived webinar

From mobile banking to telemedicine to ecommerce, consumers are relying on web and mobile apps more than ever before. But as organizations become even more dependent on the revenue these apps generate, most still aren’t doing enough to protect applications against attacks that can compromise data or lead to fraud.

Given the threat surface that applications expose, balancing the need for engaging customer experiences with robustly securing web and mobile applications and their underlying APIs can be a struggle for even the most technologically savvy enterprises.

Doing More IT With Less
Date: Jul 23, 2020

View archived webinar

If there is one universal truth among IT organizations, it's a shortage of budget.

IT professionals probably entered 2020 wondering whether you could do the job with the resources they had. Add in COVID-19 and a crashing economy, and we now have our answer.

This information-packed event looks at some of the key strategies your IT organization can use to stretch your technology, rethink costly processes, and create new ways of doing business on a shoestring. Top IT practitioners, leaders, and experts will share proven methods for rethinking operational spending, while still supporting the organization’s need to innovate in new ways.

The Changing Face of Threat Intelligence
Date: Jul 22, 2020

View archived webinar

Ten years ago, enterprises’ best “threat intel” was limited to what they could read on a few websites or what was unveiled on Microsoft’s Patch Tuesday. Today, however, enterprises are overwhelmed with options for receiving new information about cyber threats, ranging from commercial feeds to industry ISACs to specialized tools and services that collect, analyze, and prioritize threat data. How should enterprises aggregate, collate, and interpret threat data? In this webinar, learn how enterprises are using threat intelligence and best practices for integrating threat intel into security operations and incident response.

Emerging Security Threats Your Enterprise Should Be Aware Of
Date: Jul 21, 2020

View archived webinar

Every day, black hat attackers and white hat researchers are discovering new security vulnerabilities. And as COVID-19 changed everything about the way we work and communicate, attackers have created new ways to exploit weakened organizations. Are you aware of the newest – and most damaging – vulnerabilities that have been discovered or are active in the wild now? In this webinar, experts discuss some of the most dangerous emerging threats, and what you can do to defend against them.

How Cyber Attackers Will Use & Abuse AI, ML Against the Enterprise
Date: Jul 15, 2020

View archived webinar

Machine learning (ML), deep learning (DL), and artificial intelligence (AI) are powerful new technologies in the hands of cyber defenders….and in the hands of cyber attackers, as well. What could AI-powered cyber attacks look like? How can enterprises begin to defend themselves against threats like that? In this webinar, get a picture of the actual threat landscape today, realistic predictions of how it will evolve, and what businesses can do now to prepare for the future.

The Threat From the Internet and What Your Organization Can Do About It
Date: Jun 30, 2020

View archived webinar

For most enterprises, the increasing use of the Internet has created new business opportunities, greater efficiencies, and a green field for innovation. But growing use of the Internet is also increasing the risk of cyber attack. In recent years, online attackers have launched a wide range of Internet-borne attacks, ranging from DDoS to DNS-based exploits to infiltration of commercial websites. And with the world relying more heavily on Web-based communications during the COVID-19 pandemic, new threats are emerging. In this webinar, experts describe some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business.

Preparing For, Detecting, and Managing a Critical Data Breach
Date: Jun 17, 2020

View archived webinar

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you. Register today!

Preparing For, Detecting, and Managing a Critical Data Breach
Date: Jun 17, 2020

View archived webinar

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Preparing For, Detecting, and Managing a Critical Data Breach -- a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll hear about tools and best practices for detecting a breach, even when it’s well-obfuscated. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered at Preparing For, Detecting, and Managing a Critical Data Breach:

  • Strategies for creating and rehearsing an enterprise-wide breach response plan
  • Best practices and technologies for detecting potential intrusions or infections
  • Recommendations for building and managing an incident response plan
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
  • Strategies for speeding the remediation process
  • Limiting the costs and liabilities associated with cyber breaches
  • Lessons learned: how to monitor and collect data on future threats

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow -- then this virtual event is for you.

Building and Managing the Next-Generation Security Operations Center (SOC)
Date: Jun 10, 2020

View archived webinar

No matter what your industry or what your organization’s size, there is a growing need to monitor your systems for potential threats – and have the capacity to respond quickly in the event of a compromise. To build out this capacity, many enterprises are building or expanding their security operations centers (SOCs) to improve their ability to detect and respond to cyber threats. In this webinar, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today’s most current threats and online exploits.

Thinking Like an Attacker: Strategies for Defense
Date: Jun 03, 2020

View archived webinar

More and more, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.

Red Team Realities
Date: May 28, 2020

View archived webinar

Red Team is an exciting term, but it can be misconstrued. How do you know when it’s the right fit for your organization? Using real-world anecdotes, this webinar will illustrate how to navigate a decision-making process aligned to use cases and desired outcomes tailored to your organization's needs. Listen as we discuss the different levels of cybersecurity assessments, and help you determine which one is right for your organization (hint: it's in the title).

The State of IT and Cybersecurity Operations
Date: May 20, 2020

View archived webinar

As companies tighten their belts, the need for coordination between IT and Cybersecurity Operations has never been more urgent. Now is the time to align organizational priorities and budgets.

Dark Reading recently took a measure of the relationship between IT and Security teams. Join us as we discuss the survey, share it's findings and review best practices for CIOs and other leadership roles.

The Future of the Security Operations Center (SOC)
Date: May 13, 2020

View archived webinar

Today's security operations centers (SOCs) are helping enterprises to defend critical data and initiate security incident response. But most experts agree that today’s SOCs will evolve radically in the near future, as technologies such as orchestration, machine learning, artificial intelligence, and security automation become more tightly integrated into SOC processes. In this webinar, top experts will discuss the long-term evolution of SOC technology, staffing, and processes, and how your enterprise can prepare today to implement the SOC of tomorrow.

Building and Managing an Effective Mobile Security Strategy
Date: May 06, 2020

View archived webinar

Most organizations today allow employees and other users to bring their own mobile devices onto the enterprise network to access corporate data. But in many cases, security teams still do not have comprehensive, enforceable security policies that take into account the many technologies and networks that users may employ to connect their mobile devices.

5 Steps to Integrate SAST into the DevSecOps Pipeline
Date: Apr 29, 2020

View archived webinar

Even software with a solid architecture and design can harbor vulnerabilities, whether due to mistakes or shortcuts. But limited security staff don’t have the resources to perform code reviews and provide remediation guidance on the entire application portfolio. Static analysis, also known as static application security testing (SAST), is an automated way to find bugs, back doors, and other code-based vulnerabilities so the team can mitigate those risks.

How to Effectively Analyze Security Data
Date: Apr 22, 2020

View archived webinar

If your security team is like most cyber teams in large enterprises, you're probably swimming in security incident data, alerts, and log files. How can you aggregate that data and analyze it quickly, to identify sophisticated or obfuscated attacks? In this webinar, experts discuss ways to effectively collect and analyze large amounts of security data, and find the threat info you need to defend your enterprise. Speakers will also offer recommendations on how to automate some of that data analysis, so that you can identify threats more easily, and stop attackers more quickly.

Malicious Insiders: Real Defense for Real Business
Date: Apr 15, 2020

View archived webinar

"Corporate espionage, sabotage and other security incidents could be committed or aided by any insider with something to gain from it. So how might you predict when a once-trustworthy employee is about to do something malicious? How can you give staff all the tools and access privileges they need to be productive, without leaving the organization open to unnecessary risk? 

In this webinar, learn how cybersecurity professionals can reduce, detect and mitigate the insider threat without disrupting business.

Building an Enterprise Strategy for Detection and Response
Date: Apr 09, 2020

View archived webinar

In the past few years, many enterprises have deployed tools and strategies for endpoint detection and response (EDR). But today's security teams realize that EDR alone is not enough. They need visibility across all their assets, including remote users as well as managed and unmanaged devices. In this webinar, top industry experts discuss how to create a strategy that enables the enterprise security team to do detection and response across a wide variety of technologies and services.

This is a Test
Date: Apr 05, 2020

View archived webinar

1

Cyber Attack Evasion Techniques
Date: Mar 23, 2020

View archived webinar

When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.

Shaking Off Security Alert Fatigue: Tips for Taking Control
Date: Mar 18, 2020

View archived webinar

Adding new security tools to your SOC toolset may help alert you to the newest cyber threats to your business. However, when a zillion unprioritized alerts hit you in a day, you might start treating them like whack-a-mole or the snooze button on your alarm clock. How can you manage security alerts so they are most meaningful to your business, and act on them in an appropriate, timely manner? 

Preventing Credential Theft & Account Takeovers
Date: Mar 10, 2020

View archived webinar

Breaches that expose passwords and grant cyber attackers access to privileged user accounts are now so common that users greet the news with more shrugs than shock, and security experts advise to "assume user credentials have been exposed." Yet, these attacks can be as catastrophic as they are commonplace.  Stolen credentials and account takeovers are the footholds cybercriminals use to launch all manner of attacks -- from financial fraud and virtual currency theft, to data breaches and cyber espionage. In this webinar learn how these bread-and-butter cyberattacks work and how to bolster your defenses against them.     

Zero-Trust In Practice
Date: Mar 05, 2020

View archived webinar

Credential theft, lateral movement and other cyber attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero-trust model – trust nothing, verify everything – is the proposed answer to this problem. But it’s easier said than done in real enterprise. In this webinar, learn what zero-trust really looks like in practice, how to overcome challenges along the way, what security benefits you’ll realize right away, and how your organization can take the first steps toward implementing a zero-trust model.

Cloud Security Threats Enterprises Need to Watch
Date: Feb 19, 2020

View archived webinar

More businesses are shifting critical assets and operations to the cloud, as service providers enhance their security capabilities --and cyber attackers have adapted accordingly. In this webinar, experts outline the top ways that attackers are exploiting cloud services, applications and implementations and give advice on how to use the cloud more securely.

Building an Incident Readiness and Response Playbook
Date: Feb 11, 2020

View archived webinar

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.

Linking, Orchestrating, and Managing Your Enterprise Security Systems
Date: Feb 04, 2020

View archived webinar
Over the years, most enterprises have purchased and installed a wide variety of security tools and technologies, from security gateways to firewalls to malware detection systems. Individually, they all solve a problem - but they often can't work together or speak a common language. In this webinar, experts will discuss methods and technologies for linking and integrating disparate security systems to provide a more comprehensive view of security threats - and a more structured data defense. You'll get advice on how to tie your security systems together, and how to automate security processes that work across multiple tools and technologies.
12 Ways to Defeat Multi-Factor Authentication and How To Stop the Bad Guys
Date: Jan 28, 2020

View archived webinar

Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.

 

Getting the Most from Threat Intelligence
Date: Jan 23, 2020

View archived webinar

To get the most out of your relationships with information sharing groups (ISACs) and your threat intelligence feeds, you must understand how, why, and when other organizations' cyber attacks relate to your own organization.

In this webinar, learn how to take a fresh look at external threat intelligence and ensure you have an up-to-date view of attackers’ means, motives and opportunity.

Developing and Managing an Endpoint Security Strategy for Your Enterprise
Date: Jan 14, 2020

View archived webinar

Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of “endpoint security” has evolved significantly over the past year or two. How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You’ll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications.

How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with DMARC
Date: Dec 10, 2019

View archived webinar

Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.

In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.

Cloud Sprawl: Its Worse Than You Think
Date: Dec 05, 2019

View archived webinar

Organizations today are blind to how many assets they have in the cloud. Many assume they're only in the three major cloud providers (Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure). But in practice, most organizations are in ten or more providers. And if you don’t know about all of your cloud instances, you can’t secure them appropriately. Join us on December 5th to learn how to get complete visibility into your cloud infrastructure with the Expanse Internet Operations Management Platform and reduce your cloud attack surface.

Know Thyself: Cyber Threat Intelligence Gathering Inside Your Organization
Date: Dec 04, 2019

View archived webinar

Some of the most important threat intelligence resides right inside your own organization. What can you learn by taking a closer look at your SIEM, internal telemetry, user lists, and other sources?

In this webinar, learn about the tools that can help your internal threat intelligence gathering and how these efforts could help you detect attackers’ lateral movement, disrupt ransomware and protect endpoint devices.

Enterprise IoT: Rise of the Unmanaged Devices
Date: Dec 03, 2019

View archived webinar

By 2021, up to 90% of devices in businesses will be unmanaged and IoT devices - with no security. Which is why attacks on these devices are up 300% in 2019 alone.

Join Armis, the leading enterprise IoT security company, along with IBM Security Services, to see real-life scenarios of these new unmanaged devices - from enterprise to healthcare to manufacturing.

Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.