00:00 AM
Insurance & Technology
Insurance & Technology
Named Documents
Connect Directly
RSS
E-Mail
50%
50%

Events

LIVE EVENTS

Interop ITX

May 15-19, 2017 | MGM Grand, Las Vegas

Interop ITX - The Independent Conference for Tech Leaders. Five days of world-class education, compelling speakers, and unlimited networking opportunities to help technology leaders keep up with the challenges and drive their businesses forward. The 2017 Conference is organized by six major Tracks that are crucial to tech leaders and IT professionals at all points in their careers.

Register with Promo Code: IWE200 for $200 off the All Access pass.

Register Now!

 

ONLINE EVENTS

Check out these online events that are available from the comfort of your computer!  View our complete list of Upcoming Webinars so you can attend a live session or our Webinar Archives for webinars that are available On-Demand!

Upcoming Online Events

4/19
10:00am PT 1:00pm ET How Online Attackers Find Out About Your Organization
 
4/25
10:00am PT 1:00pm ET Threat Intelligence: Fight Threats, Not Logs – Slay the Volumes
 
4/26
10:00am PT 1:00pm ET Don’t be Duped: Hadoop Roll-out can be Pain Free & Easy
 
4/27
10:00am PT 1:00pm ET Get Control Over Your Data Quality/Data Governance
 
5/1
11:00am PT 2:00pm ET How Does Your Analytics Initiative Measure Up?
 
5/3
11:00am PT 2:00pm ET How Online Attackers Target Your Business – And How to Stop Them
 
5/11
10:00am PT 1:00pm ET The IT Leader's Guide to the Cybersecurity Landscape
 
5/23
11:00am PT 2:00pm ET The Art of Psycho-demographic Analytics
 
6/21
8:00am PT 11:00am ET Understanding Cyber Attackers and Cyber Threats
 

 

Don't forget to view our complete list of Webinar Archives for webinars that are available On-Demand!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.