Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Upcoming Webinars

Webinar Archives
Building a Better IT Security Architecture for Your Enterprise
Date: Oct 23, 2019
View webinar
In this Dark Reading webinar, attendees will learn to build an overarching security architecture that is built on a stronger foundation and better anticipates the potential threats to your organization.

Creating and Maintaining Effective Metrics for Assessing Enterprise Security
Date: Oct 15, 2019
View webinar
In this webinar, top experts will discuss key metrics for assessing security posture, as well as the performance of the security team. You'll learn about some useful ways to measure cybersecurity effectiveness, and how to use those metrics to demonstrate new risks as well as the ongoing performance of your security initiatives.

How To Survive A Cyber Attack & Recover Faster
Date: Oct 10, 2019
View webinar
For your business to survive a security incident, it needs to get back to doing business as soon as possible. In this webinar, learn how to prepare today, to make your business more resilient to cyber attacks tomorrow.

How is the Latest Uninterruptible Power Supply (UPS) Technology Designed for Edge and Cloud Computing?
Date: Oct 09, 2019
View webinar
Edge Computing and Cloud are two key pillars of new internet architectures. Thus, you must rethink the infrastructure solutions you deploy to support these environments, specifically Uninterruptible Power Supply (UPS) technologies.

Future-Proofing Your Next-Generation Firewall
Date: Oct 09, 2019
View webinar
Attend this Dark Reading webinar and hear as Ovum Senior Analyst Eric Parizo and a special guest from Cisco Security discuss the fundamental capabilities of an emerging "new" generation of NGFW platforms, and how enterprises can benefit from the NGFW technological and market evolution.

10 Incredible Ways to Hack Email & How to Stop the Bad Guys
Date: Sep 24, 2019
View webinar


Protect next-gen network infrastructure from terabit DDoS attacks
Date: Sep 24, 2019
View webinar
This webinar will detail DDoS mitigation concerns, solutions, and real-world use cases as well as key considerations as we roll out more 100G connections and face the reality of defending terabit+ infrastructures.

Managing IoT security through the endpoint, network, and cloud
Date: Sep 19, 2019
View webinar
This webinar will explore the need for a data security plan that protects all information domains, incorporates comprehensive risk management, and implements regular assessments as threats continue to evolve.

How to Use AI & Machine Learning to Improve Enterprise Security
Date: Sep 18, 2019
View webinar
In this webinar, a top expert will offer some useful definitions of terms, and discuss practical applications that could speed your incident response time and improve your use of IT security staff resources.

AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4147
PUBLISHED: 2019-09-16
IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 158413.
CVE-2019-5481
PUBLISHED: 2019-09-16
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
CVE-2019-5482
PUBLISHED: 2019-09-16
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
CVE-2019-15741
PUBLISHED: 2019-09-16
An issue was discovered in GitLab Omnibus 7.4 through 12.2.1. An unsafe interaction with logrotate could result in a privilege escalation
CVE-2019-16370
PUBLISHED: 2019-09-16
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.