Products and Releases
Latest Content
Page 1 / 2   >   >>
Fidelis Cybersecurity Launches Endpoint 6.0
Products and Releases  |  5/3/2016  | 
New release steals time from attackers by automating the investigation of security alerts; new architecture delivers answers in seconds and scales to serve hundreds of thousands of endpoints.
Smart Card Technology Enhances FIDO Implementations for Strong Authentication
Products and Releases  |  5/2/2016  | 
Smart Card Alliance white paper highlights benefits of smart card technology in FIDO authentication standard implementations
US PC Users Making Some Progress in Patching Software Vulnerabilities, But Significant Challenges Remain
Products and Releases  |  4/29/2016  | 
Private Microsoft® Windows® users patching their operating systems more diligently – but the same cannot be said of Apple® QuickTime® and Oracle® Java® users.
Threat Stack Secures $15.3 Million in Series B Funding to Drive More Efficiency for Cloud Security Teams
Products and Releases  |  4/29/2016  | 
Scale Venture Partners Leads Round; Market Demand and Rapid Customer Growth Key to Series B Funding Round
Bitglass Report: BYOD Supported in More Than 70 Percent of Organizations That Are Driven by Need for Increased Productivity
Products and Releases  |  4/29/2016  | 
Financial Services Industry Leads in Support for BYOD, Despite Regulations and Security Concerns
VASCO Launches FIDO U2F Certified Authenticator for Use with Popular Online Applications
Products and Releases  |  4/20/2016  | 
DIGIPASS SecureClick one-button authenticator allows users to easily add the enhanced security of two-factor authentication to common applications
Symantec Partners with Rockwell Automation to Maximize Security for Industrial PCs
Products and Releases  |  4/20/2016  | 
Symantec Embedded Security: Critical Systems Protection has been qualified for use with Rockwell Automation software
TrapX Security Expands: Fueled by Customer Demand and Additional $5 Million Investment from Strategic Cyber Ventures LLC
Products and Releases  |  4/19/2016  | 
In Addition to Triple Digit Worldwide Growth, the Company Appointed Three New Vice Presidents to Further Expand the Company’s Product Portfolio and Increase Worldwide Sales
Bastille Report Finds More Than 80 Percent of Businesses are Potentially Vulnerable to Being MouseJacked
Products and Releases  |  4/19/2016  | 
Results Suggest That Despite Increased Awareness and Concern, Some Companies and Individuals Continue to Ignore Risks of the MouseJack Threat
LANDESK Closes 7th Acquisition in 5 Years
Products and Releases  |  4/19/2016  | 
Finalizes AppSense Acquisition, Advances Lead in Unified Endpoint Management with Extended User Virtualization Capabilities
ISACA’s New Cybersecurity Boot Camp Coming to New York
Products and Releases  |  4/19/2016  | 
Intensive five-day training helps organizations develop their cyber workforces
Former NSC Director of Cybersecurity Policy Leads Illumio Cyber Assessment Program
Products and Releases  |  4/18/2016  | 
Program Designed to Identify Attack Surface and Secure High-Value Assets Inside Data Centers and Clouds
Let’s Encrypt Leaves Beta
Products and Releases  |  4/14/2016  | 
New and renewing sponsors back Let’s Encrypt technology and its mission to encrypt 100 percent of the Web
DHS, NASA PARTNER IN SEARCH OF INNOVATION IN HOMELAND SECURITY
Products and Releases  |  4/13/2016  | 
Developing Prize Competitions to Engage Citizen Scientists in Public and Private Sectors
TECHNICAL EXPERTS AT BAE SYSTEMS REVEAL DETAILS OF NEW STRAIN OF VIRULENT CYBER THREAT
Products and Releases  |  4/12/2016  | 
Cyber criminals targeting public institutions with modified form of Qbot malware
Optiv Security Expands Identity and Access Management with Close of Advancive Acquisition
Products and Releases  |  4/12/2016  | 
Transaction Brings Together Two Respected IAM Organizations to Solve Client Identity Problems in New and Innovative Ways
KnowBe4 Unveils Kevin Mitnick Security Awareness Training Spring 2016
Products and Releases  |  4/11/2016  | 
KnowBe4 adds first human pentest, USB drive test, and geo-location to simulated phishing testing.
Lookout Welcomes Bluebox Security
Products and Releases  |  4/8/2016  | 
Unsecured Vendor Access Creates the Perfect Storm for Cyber Attacks
Products and Releases  |  4/8/2016  | 
Groundbreaking Vendor Vulnerability study finds an increasing trust and dependence on third-party vendors with access to IT systems is opening organizations up to cyber-security breaches
CodeMeter Named CODiE Awards Finalist
Products and Releases  |  4/8/2016  | 
CodeMeter Secure Licensing Platform earns prestigious industry recognition
Avira Launches Phantom VPN for Secure and Anonymous Internet Access, Anywhere
Products and Releases  |  3/31/2016  | 
You wouldn’t go on a walk naked – why go exposed online?
SolarWinds Study Reveals Hybrid IT is the Reality for Majority of Businesses; Security Concerns, New Skillsets Top of Mind for IT Professionals
Products and Releases  |  3/31/2016  | 
According to the SolarWinds IT Trends Report 2016, only 9 percent of IT professionals say their organizations have not migrated any infrastructure to the cloud, while 62 percent report security remains the greatest challenge and three-quarters indicate resources and new skills are still needed
BakerHostetler Data Security Incident Response Report Reveals Being 'Compromise Ready' Better Positions Companies to Respond to Incidents
Products and Releases  |  3/30/2016  | 
Second annual report shows shift in cause of incidents – phishing/hacking/malware is now number one; cybersecurity needs to remain a top priority
Wombat Security Launches Healthcare Security Awareness and Training Program
Products and Releases  |  3/30/2016  | 
Program designed to help healthcare companies assess and manage growing security risk, protect critical patient data
Austin data startup builds security leadership with new additions
Products and Releases  |  3/30/2016  | 
Ralph Logan joins XOR Data Exchange as CISO, launches XOR Lab
More Than 90 Percent of Newly Observed Malicious Domains Worldwide Hosted in the U.S. and Germany, According to the Infoblox DNS Threat Index
Products and Releases  |  3/23/2016  | 
Creation of malicious DNS infrastructure rebounds to near record levels in the fourth quarter of 2015
Loss of Customer Trust and Decreased Revenues Most Damaging Consequences of DDoS Attacks According to IT Security Pros and Network Operators
Products and Releases  |  3/23/2016  | 
Corero Network Security Releases Second Annual DDoS Impact Study; Highlights Current Business Trends for Handling DDoS Threats and Market Demand for Protection Services from Internet Service Providers
Internal Threats Startup Teramind Launches, Helping Companies Detect and Stop Malicious Users in Real-Time
Products and Releases  |  3/23/2016  | 
Teramind’s Platform Provides Advanced Forensic Capabilities to Any-Sized Company Across Any Industry
Entrust Datacard to acquire Trend Micro's SSL operations
Products and Releases  |  3/22/2016  | 
Entrust Datacard to Acquire Trend Micro’s SSL Operations to Build on its Industry Leadership and Strategic Growth in Certificate Management
Survey: Employees would sell password for $1000
Products and Releases  |  3/22/2016  | 
Akamai's State of the Internet Report
Products and Releases  |  3/22/2016  | 
Global Average Connection Speed Up 23% and broadband adoption increased steadily since Q4 2014.
Skyport Raises $30M from GV and Cisco Investments to Ramp Delivery of Zero-Trust Secure Computing Infrastructure to the Enterprise
Products and Releases  |  3/17/2016  | 
Funding will support market demand for Skyport’s “Hyper-Secured Infrastructure”
Aruba Delivers Mobile-First Networking Portfolio
Products and Releases  |  3/17/2016  | 
New products automate secure connectivity for IoT and provide predictive insights into Wi-Fi performance on mobile, bridging the gap between IT and business priorities
EnSilo Passes $21 Million In Funding
Products and Releases  |  3/17/2016  | 
Targeted Attack Data Protection Company Backed by New Investor Rembrandt Venture Partners and Previous Investors Carmel Ventures and Lightspeed Venture Partners
CloudPassage Survey Finds Companies Want Security as Part of Continuous Development But Aren’t There Yet
Products and Releases  |  3/17/2016  | 
Lack of Resources is Biggest Barrier to Embedding Security in New Release Cycles
Microsemi To Present At Third Annual Automotive Cyber Security Summit
Products and Releases  |  3/16/2016  | 
Session Takes Place at 1:30 p.m. on March 23 at The Baronette Renaissance Detroit-Novi Hotel
Former Department of Veterans Affairs Nurse Sentenced to 60 months in prison for Altering and Falsifying VA Computer Records
Products and Releases  |  3/11/2016  | 
The case is a perfect example of the vital importance of data integrity in healthcare.
Consolidation and Modernization Chief Among Federal IT Security Concerns SolarWinds Survey Discovers
Products and Releases  |  3/11/2016  | 
In SolarWinds' Third Annual Federal Cybersecurity Survey, Organizational Changes Expected to Increase Security Challenges; Foreign Governments and Insiders Named Biggest Threat Sources
Cisco Security Chief Joins RiskSense Board
Products and Releases  |  3/10/2016  | 
Industry Luminary Brings Deep Industry Expertise to Cyber Risk Management Innovator
Simility Reports Global Online Fraud Trends
Products and Releases  |  3/10/2016  | 
Fraud Analytics Reveal Cookie Age and Windows Among 7 Leading Fraud Indicators
SkyboxSecurity Unveils Attack Surface Visualization Offering
Products and Releases  |  3/10/2016  | 
SkyboxHorizon reduces exposure to cyberattacks by giving CISOs unprecedented visibility of the attack surface and Indicators of Exposure (IOEs).
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Understanding & Managing the Mobile Security Threat
Mobile devices are increasing IT security risk. Is your enterprise ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join us as Dark Reading editors speak with IT security hiring experts about improving IT career prospects.