Products and Releases
Latest Content
Page 1 / 2   >   >>
Businesses See High Levels Of Fraud And Risk Incidents In 2016
Products and Releases  |  1/20/2017  | 
82% of executives surveyed worldwide experienced a fraud incident in the past year compared to 75% in 2015, according to the Kroll Annual Global Fraud and Risk Report
Strategic Cyber Ventures Invests $3M in ID DataWeb
Products and Releases  |  1/20/2017  | 
New funding will allow dynamic identity verification firm to further innovate its technology and expand growth and sales in new markets
COALFIRE ANNOUNCES ACQUISITION OF CYBER SECURITY LEADER, VERIS GROUP
Products and Releases  |  12/28/2016  | 
Combination Positions Coalfire with New Cyber Risk, Compliance, and Technical Testing Capabilities
BIO-key Debuts Wearable Fingerprint Reader for New Devices At CES
Products and Releases  |  12/27/2016  | 
BIO-key to show wearable fingerprint reader for Windows, Micro USB Fingerprint Reader for Android and Biometric Padlocks
SECDO Completes $10M Funding to Revolutionize Security Incident Response
Products and Releases  |  12/22/2016  | 
Investment was led by the Rafael Development Corporation (RDC) and Check Point Co-founder & Chairman Marius Nacht
Cybersecurity Is Maturing, People Still the Problem: Nuix
Products and Releases  |  12/19/2016  | 
A Nuix executive survey discovered cybersecurity approaches are maturing, but spending is misdirected and human behavior is the largest security threat.
Consumers More Worried About Cybercrime Than Physical World Crime: Sophos
Products and Releases  |  12/14/2016  | 
A Sophos survey discovered consumers are more concerned about cybercrime than physical world crime, yet awareness of phishing scams and ransomware remains low.
Symantec Files Patent Infringement Suit Against Zscaler, Inc.
Products and Releases  |  12/12/2016  | 
Company Takes Legal Action to Safeguard Patented Technologies
PCI SECURITY STANDARDS COUNCIL PUBLISHES SUPPLEMENTAL PCI DSS SCOPING GUIDANCE
Products and Releases  |  12/9/2016  | 
Guidance Clarifies Scoping Principles Outlined in the PCI Data Security Standard
Mach37 Announces New Platinum Sponsor: General Dynamics Mission Systems
Products and Releases  |  12/8/2016  | 
Private sector sponsorship expedites Virginias quest to become the cybersecurity capital of the world.
Dell Unveils Dell Data Protection | Secure Lifecycle: Next-Generation Data Protection for the Entire Data Lifecycle
Products and Releases  |  12/2/2016  | 
Secures critical business documents and maintains protection as data moves across devices Provides IT with the authority to enact data leakage prevention, digital rights management and file access monitoring Expands visibility of where and how businesses access their data with granular policy controls capabilities
Cloud Security Alliance Launches Crowdfunded Cloud Security Management Tool
Products and Releases  |  12/2/2016  | 
The STARWatch SaaS application was designed to help organizations manage compliance and risks using CSA standards and best practices.
Infinite Group Inc. Introduces Nodeware Vulnerability Management Solution
Products and Releases  |  12/2/2016  | 
Nodewares plug-and-play system is intended to simplify and enhance security for SMBs.
Americans Fear Russian Hackers: Alertsec Survey
Products and Releases  |  12/1/2016  | 
Alertsecs 2016 Security Breach Study reveals that 2016 hacks changed security practices and that Americans worry about Russian hackers
FireEye Announces Helix the First Intelligence-led Platform to Simplify, Integrate, and Automate Security Operations
Products and Releases  |  11/29/2016  | 
Accelerates response with automation and orchestration powered by machine-learning and behavioral analysis based detection from FireEye MVX plus FireEye iSIGHT Intelligence Delivered via public or private cloud, or on premise, to integrate and prioritize every alert in customer environments within a simple user interface
BeyondTrust Adds File Integrity Monitoring for Unix and Linux Systems
Products and Releases  |  11/29/2016  | 
Least-privilege solution improves security by tamper-proofing critical binaries.
CloudPassage Launches New Release of Halo Agile Security Platform
Products and Releases  |  11/29/2016  | 
Improved Visibility and Filtering for Simplified Workload Security Management
TruSTAR Technology Secures Funding to Accelerate Company Growth and Connective Defense Vision
Products and Releases  |  11/17/2016  | 
Security Startup Obtains New Funding as Companies and Policymakers Signal Growing Need for Privacy-Preserving Cyber Incident Collaboration
Samsung SDS Selects Cyberbit For Industrial Control Security
Products and Releases  |  11/16/2016  | 
Samsung SDS will deliver Cyberbit's SCADAShield to protect its customers' industrial control networks.
Thomson Reuters, Pillsbury, FireEye Align For Cybersecurity Compliance Program
Products and Releases  |  11/14/2016  | 
Thomson Reuters, Pillsbury and FireEye have teamed up to help businesses meet new regulations and manage cybersecurity-related risk.
Thycotic Acquires Cyber Algorithms
Products and Releases  |  11/8/2016  | 
Thycotic has acquired the network security analytics company to identify malicious privileged behavior across systems and users.
FireEye Introduces Cloud MVX and MVX Smart Grid
Products and Releases  |  11/4/2016  | 
The most intelligent threat detection delivered via public, hybrid, or private cloud.
New Report Finds Majority of Activity on the Dark Web is Totally Legal and Mundane
Products and Releases  |  11/4/2016  | 
Terbium Labs Dispels Common Myths and Misconceptions with First Data-Driven Examination of the Dark Web
LightCyber Increases Precision of Behavioral Attack Detection
Products and Releases  |  11/4/2016  | 
New Release Uncovers Malicious Insider or Targeted Attacker Faster and with even Higher Accuracy
NetEnrich Survey: Companies Brace for New Cyber Attacks as Threats Multiply
Products and Releases  |  11/4/2016  | 
Stolen or weak passwords cause most attacks, but companies are also battling rogue employees, state-sponsored organizations, system failures and Advanced Persistent Threats
CounterTack Announces $10M Round of Funding
Products and Releases  |  11/4/2016  | 
Financing Round Closed to Accelerate Global Expansion in APAC and Federal Business.
Flexera Software Acquisition Tackles Open Source Software Security Risks
Products and Releases  |  11/4/2016  | 
Extends license compliance and security capabilities into the under-managed world of open source software components.
FireMon acquires FortyCloud for Multi-cloud Management Capabilities
Products and Releases  |  11/4/2016  | 
Innovation streak continues with new Intelligent Security Management solutions for the cloud.
Intel Security Outlines Strategy for Protecting New Digital Economy
Products and Releases  |  11/3/2016  | 
Intel Security Enhances Unified Defense Architecture to Safeguard Against Threats to Trust, Time and Money
Ubuntu Core 16 delivers foundation for secure IoT
Products and Releases  |  11/3/2016  | 
BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises
Products and Releases  |  11/3/2016  | 
BioCatchs 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools
DomainTools Launches New Cyber Threat Solution, PhishEye, to Stop Phishing Attacks Before They Occur
Products and Releases  |  11/3/2016  | 
New Cybersecurity Technology Leverages World's Largest DNS Database to Help Organizations Take Preventative Action Against Threats and Monitor "Phishy" Domain Names
Acalvio Technologies Secures Investment from GV
Products and Releases  |  11/3/2016  | 
GV (formerly Google Ventures) Joins Accel Ventures, Ignition Partners, Eileses Capital and Splunk, Bringing Total Investment in the Company to $22M
NSS Labs Tests Leading Web Browsers for Secure End User Experience
Products and Releases  |  11/1/2016  | 
Ransomware, socially engineered malware, and phishing increasingly used by attackers
Airbiquity, Harman Team Up On Intrusion Detection System For Connected Vehicles
Products and Releases  |  10/31/2016  | 
The two automotive technology companies joined forces to address connected vehicle cybersecurity concerns with an end-to-end solution.
Samsung Acquires Tachyon, Enterprise Mobile Device Configuration and Deployment Software
Products and Releases  |  10/27/2016  | 
Acquisition is intended to automate the setup process for Samsungs enterprise Android devices*, with the plan for faster, more secure and cost-effective, accurate and complete rollouts.
Tenable Network Security Acquires Container Security Firm FlawCheck
Products and Releases  |  10/26/2016  | 
Acquisition of San Francisco-based FlawCheck extends Tenable capabilities to provide comprehensive security for customers using Docker containers.
Common Enterprise IoT Devices Are Hackable In Under Three Minutes
Products and Releases  |  10/26/2016  | 
ForeScout analysis highlights the dangers posed by enterprise IoT devices, discovering that most can act as simple points of entry into critical enterprise networks.
Millennial Habits Threaten Federal IT Security
Products and Releases  |  10/25/2016  | 
As security-conscious baby boomers retire, a survey of the growing millennial workforce reveals a new generation more likely to trade caution for digital productivity.
75% Of Orgs Lack Skilled Cybersecurity Experts
Products and Releases  |  10/20/2016  | 
In a Tripwire study, 25% of respondents were confident their businesses have enough skilled cybersecurity experts to effectively detect and respond to serious breaches.
Voters Believe Cyberattacks More Threatening to U.S. Than ISIS
Products and Releases  |  10/19/2016  | 
Voters believe that both presidential candidates lack an adequate cyber security plan
Most Businesses Don't Inspect Cloud Services For Malware
Products and Releases  |  10/19/2016  | 
As cloud services usage, and risk, increases, businesses still lack visibility into data breaches.
Phantom Announces New Product, Partners, and Playbooks
Products and Releases  |  10/12/2016  | 
Community-Powered Approach to Drive Innovation and Growth
WhiteHat Security Partners with NowSecure For Mobile Application Security Testing Solution
Products and Releases  |  10/12/2016  | 
WhiteHat Sentinel Mobile Express features automated static and dynamic testing to quickly detect and verify mobile application vulnerabilities
FireMon Welcomes New President & CEO, Satin H. Mirchandani
Products and Releases  |  9/30/2016  | 
Security management vendor forges ahead with new CEO at the helm
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
Secure Application Development - New Best Practices
Secure Application Development - New Best Practices
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.