Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Upcoming Webinars

Webinar Archives
Strategies for Success with Digital Transformation
Date: Mar 09, 2021
View webinar
In this webinar, experts will discuss best practices for implementing and managing a digital transformation strategy.

How Elite Analyst Teams are Transforming Security with Cyber Reconnaissance
Date: Feb 24, 2021
View webinar
In this webinar, we will look at case studies from consumer banks and big retail to illustrate how these organizations are leveraging their analyst teams in more strategic ways to vastly improve their security postures. Learn how these organizations are getting the upper hand on high-criticality threats by tracing, mapping and monitoring the infrastructures of their high priority adversaries.

The Failures of Static DLP and How to Protect Against Tomorrow's Email Breaches
Date: Feb 18, 2021
View webinar
In the last 12 months, 93% of organizations experienced security incidents where email use has put sensitive data at risk. Join this webinar to learn the impact of the COVID-19 pandemic on email security and remote working, the limitations of static DLP technologies to prevent human-activated email data breaches, and more.

Protecting Your Enterprise's Intellectual Property
Date: Feb 17, 2021
View webinar
In this webinar, you'll learn about the techniques and tactics that cybercriminals use to crack IP, and how your organization can detect and defend itself against these sophisticated, targeted attacks.

Building the SOC of the Future: Next-Generation Security Operations
Date: Feb 11, 2021
View webinar
In this webinar, experts offer insight and recommendations on how to build a next-generation SOC, and what tools and skills you may need to outfit that SOC to respond to today's most current threats and online exploits.

Securing and Monitoring Networks in the 'New Normal'
Date: Feb 10, 2021
View webinar
In this webinar, top experts discuss methods for re-architecting network and security strategies to ensure that these new worker and business models remain safe and minimize cyber risk. You'll learn how you can adapt your enterprise's and security tools and practices to the "new normal," and how to use these changes to make your corporate data more secure.

ROI and Beyond for the Cloud
Date: Feb 10, 2021
View webinar
Moving to the cloud isn't just about pulling expensive equipment out of a data center. Going with a cloud provider involves its own set of costs. However, a cloud strategy offers other business benefits, some that can be calculated on a dollar basis and others that are on the softer side. In this webinar learn how to evaluate the payback from a cloud move in savings and business benefits.

What We Can Learn from Sports Analytics
Date: Feb 09, 2021
View webinar
In this webinar you'll learn ways to use examples of data analytics in the sports world to speed up your business analytics projects, how some sports teams have solved traditional analytics challenges and how those workarounds can be applied to your enterprise, how sports teams can predict and project talent and how you can do the same in your own organization, and more.

Making Cybersecurity Work in Small and Medium-Sized Businesses
Date: Feb 03, 2021
View webinar
In this webinar, experts offer tips and recommendations for securing the smaller enterprise, and for implementing simple, affordable tools and best practices that make sense for resource-limited SMB.

5 Steps to Solving Modern Scalability Problems
Date: Jan 28, 2021
View webinar
Attend this webinar to learn how distributed data models can keep up with today's data columns and offer other benefits like resiliency, tunability, enhanced security and faster performance, how you can simplify microservices management and improve scalability, and why cloud-native applications are the best option for organizations with hybrid cloud and/or multi-cloud environments.

Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
CVE-2021-1071
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...