Upcoming Webinars
Webinar Archives
Securing Your Endpoints from Ransomware & Other Trending Attacks
Date: Jun 28, 2017
View webinar
Attackers have shifted their tactics. They've discovered new ways to re-engineer tactics to make them easier to execute, more evasive, and more likely to deceive targeted users. Combined with targeting platforms that organizations falsely consider more secure, these sophisticated attacks, including ransomware, are proving very damaging to unprepared organizations.

Analytics 2017: What we Learned & What?s to Come
Date: Jul 06, 2017
View webinar
At AllAnalytics, our editors have interviewed countless experts, attended numerous events (virtually and in person), and have tracked the news and opinion related to technology, analytics, artificial intelligence, and more. We've talked to CIOs, CTOs, data scientists, data analysts, recruiters, marketers, and business users. It's time to sit down and take stock of all that our editors, Jim Connolly and Jessica Davis, have seen and heard during the first half of 2017.

Data: To Trust or to Not Trust the Data, That is The Question!
Date: Jul 11, 2017
View webinar
Join us as the author of the book "Everydata: The Misinformation Hidden in the Little Data You Consume Every Day" examines common ways data is misrepresented or misinterpreted, the limitations of forecasts and predictions, and how to recognize "Tells" in data. Register today!

How Cloud Can Streamline Business Workflow
Date: Jul 11, 2017
View webinar
In order to optimize your utilization of cloud computing, you need to be able to deliver reliable and scalable high performing application over your corporate network. Your business counterparts will expect you to provide network performance that can handle all kinds of workload spikes, which means being able to leverage the cloud for prioritizing traffic, scaling your applications' workloads, and streamlining connections between data centers. In this lesson, we'll discuss how to use cloud computing services and capabilities for planning and implementing application delivery for all of your business's cloud computing environments.

[Cyber Attackers] How They Research Your Organization & What To Do About It
Date: Jul 13, 2017
View webinar
In this eye-opening webinar, you'll learn how attackers can take advantage of your website, employees' social media, and other vehicles to learn about your organization - and get the ammunition they need to convince your end users to trust them.

Stop the Stopgaps: How to Look for New Security Technologies
Date: Jul 19, 2017
View webinar
Given today's threat landscape, combined with so many security options available today, it can be daunting when selecting new or alternative technologies to protect your business. Your security team has unique challenges; therefore, you should be asking your next security vendor how they will meet your requirements--both for today, and the future. Join us and hear as David Monahan, Research Director for Risk and Security Management with EMA, shares his thoughts and recommendations around security best practices.

Out of the Black Box: Selling Security to your C-suite
Date: Jul 20, 2017
View webinar
To maximize the return on cloud security investments, CISOs need a seat at the table. Unfortunately, getting them there isn't always simple, especially when security is often handled in a clandestine way that doesn't always clearly demonstrate its value. Join us as we explore key steps security professionals can employ to get their security program "out of the black box" and into their organization's cloud strategy.

The Real Impact of a Data Security Breach
Date: Aug 02, 2017
View webinar
In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business and how an effective data breach response program can help mitigate the damage.

Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
The Dark Reading Security Spending Survey
The Dark Reading Security Spending Survey
Enterprises are spending an unprecedented amount of money on IT security where does it all go? In this survey, Dark Reading polled senior IT management on security budgets and spending plans, and their priorities for the coming year. Download the report and find out what they had to say.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.