Upcoming Webinars

Webinar Archives
Virtual Event: Building a Cyber Defense for 2019
Date: Dec 12, 2018
View webinar
At this Dark Reading virtual event, security practitioners, industry visionaries, and technology developers come together to discuss the key changes to expect in the next 12 months - and how you can prepare for them.

Cyber Threat Intelligence Inside Your Organization
Date: Nov 14, 2018
View webinar
In this webinar, learn about the tools that can help your internal threat intelligence gathering, how to fine-tune your monitoring efforts, and how efforts like these could help you detect attackers and defend your business.

10 Emerging Threats to Today's Enterprise Applications
Date: Nov 08, 2018
View webinar
In this Dark Reading webinar, application security experts offer a look at some of the latest and most potentially damaging threats to current enterprise apps, and how those threats can expose your organization to data compromise and theft. The experts also offer some practical advice on how to identify these threats and vulnerabilities in your organization - and how to secure your applications to limit the impact of an application-focused attack.

The Network of the Future is Powered by AI
Date: Nov 01, 2018
View webinar
In this webinar, the CIO of Dartmouth, Mitch Davis, is joined by experts from Mist and Juniper to describe how AI-driven networks are boosting the user experience at the esteemed Ivy League college and the lessons that enterprise IT can learn from their implementation.

Lambda Architecture with In-Memory Technology
Date: Oct 31, 2018
View webinar
To meet existing and future needs, organizations need a new kind of data warehouse that can handle both kinds of data processing: batch workloads for traditional reporting, as well as real-time or near-real-time streaming data. For this, they need a data warehouse of the future based on Lambda architecture.

SOC Evolution: How and Why to Update Your Security Operations Center
Date: Oct 30, 2018
View webinar
In this webinar, learn the benefits of updating your security operations center and get recommendations on how to implement the essential tools and practices of a next-gen SOC.

Is Your Email Authentication Technology Really Automated?
Date: Oct 25, 2018
View webinar
Attend this webinar and you'll learn the reality of DNS as a legacy system, where the manual process goes wrong and why enforcement matters.

How Headless CMS Fits into Modern Web Architectures
Date: Oct 24, 2018
View webinar
Many traditional Web Content Management (WCM) and CMS vendors are providing headless content delivery options as a way to support web and non-website experiences. Are you looking at how to integrate your WCM/CMS tools with a modern approach to web development and omnichannel content delivery? Are you interested in getting a review of architectural options to leverage your investment in Experience Management/WCM/CMS systems? If so, then this webinar is for you.

Purple Team Tactics & TI for Effectively Training Your Cybersecurity Team
Date: Oct 23, 2018
View webinar
Find out how purple team tactics and tactical threat intelligence can be used to enhance your security team's capabilities against the next-generation cyber-attacks.

Effective Cyber Risk Assessment
Date: Oct 17, 2018
View webinar
Hear as top experts explain how to quantify the risks cyber threats pose to your organization, empowering you to make smarter decisions about defense strategy and spending.

12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
CVE-2018-17980
PUBLISHED: 2018-10-15
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is execute...
CVE-2018-18259
PUBLISHED: 2018-10-15
Stored XSS has been discovered in version 1.0.12 of the LUYA CMS software via /admin/api-cms-nav/create-page.
CVE-2018-18260
PUBLISHED: 2018-10-15
In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via /admin/media/upload?actions=false.
CVE-2018-17532
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.