Products and Releases
Latest Content
Page 1 / 2   >   >>
Internet Pioneer Discusses Creation, Expectations and Security of DNS on Its 33rd Birthday
Products and Releases  |  6/23/2016  | 
"The Internet community has let legacy infrastructure designs constrain the future."
Zimperium Closes $25 Million Series C Funding Led By Warburg Pincus
Products and Releases  |  6/20/2016  | 
Mobile defense leader will use financing to expand global customer reach
Trustwave and CounterTack Team to Reduce Impact of Data Breaches
Products and Releases  |  6/7/2016  | 
Alliance Expands Portfolio of Trustwave Managed Security Services Worldwide, Brings Endpoint Detection and Response Capabilities to Asia-Pacific Market through Singtel
New Innovations From Veracode Help Security Teams and Software Developers Protect Applications and Shorten Time to Deployment
Products and Releases  |  6/6/2016  | 
Today's Announcement Highlights the Opportunity for a New Approach to Application Security, Extending It Seamlessly From Application Development to Protecting Applications as They Are Running
New IDESG Service Empowers Organizations To Better Protect Digital Identities
Products and Releases  |  6/6/2016  | 
Registry is Key Step in Growing Healthy and Secure Online Identity Ecosystem
WhiteHat Founder Jeremiah Grossman Joins SentinelOne as Chief of Security Strategy
Products and Releases  |  6/6/2016  | 
Industry Visionary Brings History of 
Innovation and Leadership to Accelerate Company Growth
Quick Heal® Technologies First Quarter 2016 Threat Report Confirms the Rising Threat of Ransomware as New Variants Emerge
Products and Releases  |  6/2/2016  | 
Windows and Android malware detections continue to increase, with Android malware samples up 38 percent over the first quarter in 2015
Alert Logic Partners with Mitsui for Japan Expansion
Products and Releases  |  6/2/2016  | 
Global business conglomerate to deliver Alert Logic Security-as-a-Service solutions to companies in Japan
Vista Equity Partners to Acquire Ping Identity
Products and Releases  |  6/2/2016  | 
Acquisition Will Accelerate Growth and Innovation for Identity Defined Security Leader
Optiv Security Further Strengthens New England Presence with Acquisition of Adaptive Communications
Products and Releases  |  6/2/2016  | 
Move Enables Company to Better Meet the Growing Cyber Security Needs of New England Businesses
Survey Reports that 69 Percent of Employees Admit to Sharing Sensitive Information Outside of the Organization
Products and Releases  |  5/31/2016  | 
Findings from survey conducted at Citrix Synergy 2016 highlight the need for integrated data-centric security
Votiro Raises $4 Million in Series A Round to Neutralize Zero-Day Threats
Products and Releases  |  5/25/2016  | 
Entirely self-funded since 2010, Votiro will use the new capital to further enhance its solutions and expand its global reach.
Attivo Networks Provides First Deception-based Threat Detection Platform for Internet of Things (IoT)
Products and Releases  |  5/24/2016  | 
Detection Platform Addresses Gaps in IoT Security with Real-time Threat Detection and Attack Forensics for Accelerated Incident Response
vArmour Raises $41 Million to Expand Data Center and Cloud Security Leadership Globally Through Strategic Distribution Partners
Products and Releases  |  5/24/2016  | 
Funding to accelerate the distribution of vArmour’s simple, scalable and economical data center and cloud security solution
K2 Intelligence Announces Partnership with BitVoyant
Products and Releases  |  5/20/2016  | 
Partnership combines massive proprietary cyber datasets with leading cyber defense and corporate investigations expertise
Security By The Numbers Launches IT Security Measurement Index and Collaborative Group
Products and Releases  |  5/17/2016  | 
Online resource behind benchmark survey promises to help companies measure the effectiveness of cybersecurity and share best practices
EventTracker Adds Unlimited Acquisition Model for Log Manager
Products and Releases  |  5/17/2016  | 
The scalable log management solution is now available in several pricing models.
Avanan Raises $14.9 Million Series A Financing Round
Products and Releases  |  5/17/2016  | 
Pwnie Express Announces $12.9 Million in Series B Funding
Products and Releases  |  5/11/2016  | 
Ascent Venture Partners leads funding round with participation from MassMutual Ventures to accelerate growth for IoT and BYOD cyber security leader
Bayshore Networks Raises $6.6M from Trident Capital Cybersecurity and Current Angel Investors
Products and Releases  |  5/11/2016  | 
Provides cloud-based software that addresses security gaps in the Industrial IoT; Impressed investors with its growing base of F-100 customers and strategic alliances; Overall revenues for IoT security products will exceed $20B by 2020, according to IDC
EY M&A Report: Cyber security deals increased 9% in Q1 2015
Products and Releases  |  5/11/2016  | 
Technology M&A volume in 1Q16 was up 8% over last quarter and 2% over the same period last year
Black Duck Software Posts 15% Uptick in Sales Team Security Proficiency with Qstream
Products and Releases  |  5/11/2016  | 
Data-Driven Sales Capabilities Platform Helps Market Innovator Improve Client Interactions
FireEye Enhances its Threat Management Platform with Security Orchestration
Products and Releases  |  5/11/2016  | 
FireEye Security Orchestrator and Cross-Platform Updates Create the Future of Security Operations with Intelligence-led Detection, Automated Response, and Unification of Multivendor Environments
Fidelis Cybersecurity Launches Endpoint 6.0
Products and Releases  |  5/3/2016  | 
New release steals time from attackers by automating the investigation of security alerts; new architecture delivers answers in seconds and scales to serve hundreds of thousands of endpoints.
Smart Card Technology Enhances FIDO Implementations for Strong Authentication
Products and Releases  |  5/2/2016  | 
Smart Card Alliance white paper highlights benefits of smart card technology in FIDO authentication standard implementations
US PC Users Making Some Progress in Patching Software Vulnerabilities, But Significant Challenges Remain
Products and Releases  |  4/29/2016  | 
Private Microsoft® Windows® users patching their operating systems more diligently – but the same cannot be said of Apple® QuickTime® and Oracle® Java® users.
Threat Stack Secures $15.3 Million in Series B Funding to Drive More Efficiency for Cloud Security Teams
Products and Releases  |  4/29/2016  | 
Scale Venture Partners Leads Round; Market Demand and Rapid Customer Growth Key to Series B Funding Round
Bitglass Report: BYOD Supported in More Than 70 Percent of Organizations That Are Driven by Need for Increased Productivity
Products and Releases  |  4/29/2016  | 
Financial Services Industry Leads in Support for BYOD, Despite Regulations and Security Concerns
VASCO Launches FIDO U2F Certified Authenticator for Use with Popular Online Applications
Products and Releases  |  4/20/2016  | 
DIGIPASS SecureClick one-button authenticator allows users to easily add the enhanced security of two-factor authentication to common applications
Symantec Partners with Rockwell Automation to Maximize Security for Industrial PCs
Products and Releases  |  4/20/2016  | 
Symantec Embedded Security: Critical Systems Protection has been qualified for use with Rockwell Automation software
TrapX Security Expands: Fueled by Customer Demand and Additional $5 Million Investment from Strategic Cyber Ventures LLC
Products and Releases  |  4/19/2016  | 
In Addition to Triple Digit Worldwide Growth, the Company Appointed Three New Vice Presidents to Further Expand the Company’s Product Portfolio and Increase Worldwide Sales
Bastille Report Finds More Than 80 Percent of Businesses are Potentially Vulnerable to Being MouseJacked
Products and Releases  |  4/19/2016  | 
Results Suggest That Despite Increased Awareness and Concern, Some Companies and Individuals Continue to Ignore Risks of the MouseJack Threat
LANDESK Closes 7th Acquisition in 5 Years
Products and Releases  |  4/19/2016  | 
Finalizes AppSense Acquisition, Advances Lead in Unified Endpoint Management with Extended User Virtualization Capabilities
ISACA’s New Cybersecurity Boot Camp Coming to New York
Products and Releases  |  4/19/2016  | 
Intensive five-day training helps organizations develop their cyber workforces
Former NSC Director of Cybersecurity Policy Leads Illumio Cyber Assessment Program
Products and Releases  |  4/18/2016  | 
Program Designed to Identify Attack Surface and Secure High-Value Assets Inside Data Centers and Clouds
Let’s Encrypt Leaves Beta
Products and Releases  |  4/14/2016  | 
New and renewing sponsors back Let’s Encrypt technology and its mission to encrypt 100 percent of the Web
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How To Build An Effective Defense Against Ransomware
A compendium of Dark Reading´s best recent coverage of ransomware attacks, as well as best practices for defending your enterprise against them.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Tim Wilson speaks to two experts on vulnerability research – independent consultant Jeremiah Grossman and Black Duck Software’s Mike Pittenger – about the latest wave of vulnerabilities being exploited by online attackers