Upcoming Webinars

Webinar Archives
Cybersecurity Crash Course - Session 7: Security For IoT
Date: Mar 08, 2018
View webinar
Today's IT environment increasingly employs a variety of devices that are intelligent and Internet-connected - but are not computers or phones. What's the best strategy for securing these devices as they are added to your corporate computing environment? Hear as a top IoT security expert offers some insight.

Cybersecurity Crash Course - Session 6: Insider Threats and Data Leaks
Date: Feb 22, 2018
View webinar
In this session, a top expert offers some essential advice on stopping data loss from within.

Cybersecurity Crash Course - Session 5: The Real Risks of Mobile Technology In the Enterprise
Date: Feb 15, 2018
View webinar
In this session, a top expert will debunk some of the myths about mobile security while raising up some threats and vulnerabilities you may not know about.

[Cloud Security] Strategies for Monitoring & Measuring
Date: Feb 14, 2018
View webinar
In this Dark Reading webinar, a top expert offers a look at practices and tools that will help your team monitor security in IT environments that incorporate many cloud applications and services.

Strategies for Using Cyber Threat Intelligence
Date: Feb 13, 2018
View webinar
Learn how your IT organization can develop processes to quickly digest threat data and turn it into real actions, improving response to new threats and increasing overall security.

Cybersecurity Crash Course - Session 4: Securing End User Identities
Date: Feb 08, 2018
View webinar
How can enterprises build a security strategy that identifies the end user and applies the appropriate security - no matter what their location or device? This session provides new insights on securing your end users.

GDPR: Gain Visibility & Control of Your Customers' Data
Date: Jan 31, 2018
View webinar
Attend this webinar to discover how you can achieve your data privacy goals.

Modernize Your Network System w/SD-WAN & NFV
Date: Jan 30, 2018
View webinar
In this session, we'll explore the organizational culture that must shift to include network managers in digital initiatives, and the technical options available to help modernize network systems, including software-defined wide area network (SD-WAN) and network function virtualization (NFV), network automation, and cloud services.

Cybersecurity Crash Course - Session 3: How to Talk to Management About Cybersecurity and Risk
Date: Jan 25, 2018
View webinar
Wondering how you can convey the current state of your IT security posture to top management? or how you can make a business case for investing in additional IT security resources? In this informative session, you'll get advice and recommendations on how to present security issues to your management - in language they can understand.

[Dark Reading Webinar] Becoming a Threat Hunter in Your Enterprise
Date: Jan 25, 2018
View webinar
Today there is a new wave of "threat hunting," in which the security team takes a more proactive approach -- attend this webinar to learn more about it!

New Developments in LTE for the Enterprise
Date: Jan 25, 2018
View webinar
Enterprise networking has long faced a standardized competitive environment largely defined by Wi-Fi solutions. That is about to change with the introduction of MulteFire, a new wireless solution that will bring seamless connectivity to users with enhanced coverage and capacity.

Cybersecurity Crash Course - Session 2: Why Your IT Security Program Is Broken And How To Fix It
Date: Jan 18, 2018
View webinar
In this Dark Reading cybersecurity crash course session you will learn from a top expert how to shift away from an old, ineffective security mindset towards one that is risk-based, threat-aware, and aligned to your business.

Preparing for 3rd Party Cyber Risk Management
Date: Jan 18, 2018
View webinar
Join Michael Rasmussen, Founder of GRC20/20, and Gary Phipps, Senior Director of Solution Engineering at CyberGRX, so you can kick off 2018 with a strategic approach to third-party cyber risk management.

How to Attract More Women Into Cybersecurity - Now
Dawn Kawamoto, Associate Editor, Dark Reading,  1/12/2018
AI in Cybersecurity: Where We Stand & Where We Need to Go
Raffael Marty, VP Security Analytics, Sophos,  1/11/2018
What Can We Learn from Counterterrorism and National Security Efforts?
Adi Dar, Chief Executive Officer of Cyberbit,  1/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.