Products and Releases
Latest Content
Page 1 / 2   >   >>
DHS-Funded SWAMP Program Offers Veracode Cloud-Based Security Service to Better Protect U.S. Critical Infrastructure
Products and Releases  |  9/19/2014  | 
Veracode Provides Industry-Leading Technology to Identify Vulnerabilities in Open Source Software Used by Federal Agencies and Other Organizations
vArmour Launches out of Stealth Mode, Unveiling Data Center Security to Protect the New Data Defined Perimeter
Products and Releases  |  9/19/2014  | 
Three Years in the Making, vArmour Secures the Agile Data Center From Advanced Cyber Attacks in the Cloud, Virtual and Mobile World.
Glasswall and Encyptics Partner to Eliminate Security Risks in Files and Email Attachments
Products and Releases  |  9/18/2014  | 
Deal creates policy-driven proactive defense-in-depth approach to data security.
Ping Identity secures $35M to put a bullet in the password
Products and Releases  |  9/18/2014  | 
Ping Identity secures $35M to put a bullet in the password
DigiCert Releases Tool to Simplify SHA-2 Migration for System Administrators
Products and Releases  |  9/17/2014  | 
Google’s new policy to show warnings in the Chrome browser for SHA-1 certificates as early as this November makes migration to SHA-2 a high priority for website operators
Information Security Forum Releases Standard of Good Practice 2014
Products and Releases  |  9/17/2014  | 
Annual Update Provides Guidance on the Implementation of the NIST Cybersecurity Framework
FireLayers announces cloud application security gateway
Products and Releases  |  9/17/2014  | 
Industry’s first policy-based cloud application security gateway enables security, compliance and IT governance across all cloud applications by any user on any device
Sentrix Secures $6 Million in Financing from Magma Venture Partners and Cedar Fund
Products and Releases  |  9/17/2014  | 
Appoints New CEO and Board Members to Rapidly Expand Sales of Cloud-Based Website Security and Performance Solutions in U.S. and Europe
Toopher part of group winning $1.47M NIST award to pilot Secure Electronic ID, led by MorphoTrust and State of NC
Products and Releases  |  9/17/2014  | 
NSTIC Grant Facilitates Test of Security, Viability and Interoperability of a Driver License-Equivalent for Online Transactions
FireEye and Mandiant Unite to Deliver Industry's First Global Security as a Service Solution
Products and Releases  |  9/17/2014  | 
Introduces Next Generation Threat Intelligence Suite for Deeper Insights Into Cyber Attacks
Vishing Module Takes a Bite Out of Automated Attacks
Products and Releases  |  9/16/2014  | 
New Social Engineering Scenarios from Kevin Mitnick Allows IT Managers to Curb Automated Vishing Attacks
Belden Research Reveals Dragonfly Malware Likely Targets Pharmaceutical Companies
Products and Releases  |  9/15/2014  | 
New report “Defending Against the Dragonfly Cyber Security Attacks, Part A – Identifying the Targets” published.
EventTracker Announces 7.6 with Smart Search
Products and Releases  |  9/15/2014  | 
EventTracker Enterprise 7.6 new features simplify the extraction of operational and security intelligence from machine data.
World-Renowned Experts to Speak at International Cyber Conference in Tel Aviv (live stream available)
Products and Releases  |  9/15/2014  | 
PM Netanyahu, Shimon Peres, Maj. Gen. Isaac Ben-Israel and Eugene Kaspersky to speak at annual forum on cybersecurity and technologies
FireHost Fuses Security and Compliance in Unique Compliance-as-a-Service Offering
Products and Releases  |  9/12/2014  | 
CaaS Solution Helps PCI-, HIPAA-driven Companies Reduce Risk By Addressing Compliance in the Industry’s Most Secure Cloud
Context hacks into Canon IoT Printer to run Doom
Products and Releases  |  9/12/2014  | 
Ability to compromise internet-connected devices raises more questions about IoT security
HP Rolls Out Active Defense Offerings
Products and Releases  |  9/10/2014  | 
New portfolio offerings arm organizations to take action with application self-protection, unified network security detection and enhanced log management
WatchGuard Technologies’ New Policy Map Provides ‘X-Ray’ Vision Into Firewall Configurations and Network Traffic
Products and Releases  |  9/10/2014  | 
Newest enhancement to award-winning visibility solution, WatchGuard Dimension™, allows admins to see policy misconfigurations and optimize traffic
Juniper Adds Lastline Advanced Threat Intelligence to SRX Firewalls
Products and Releases  |  9/10/2014  | 
Lastline Knowledge Base of Advanced and Evasive Threats Immediately Accessible and Actionable through Juniper Spotlight Secure Platform
LightCyber Announces $10 Million Funding Round Led by Battery Ventures
Products and Releases  |  9/10/2014  | 
Battery joins existing investors to scale up sales and marketing operations for company’s award-winning automated breach detection and response platform
Coalfire to Sponsor the Capture the Flag Competition at OWASP AppSec USA 2014
Products and Releases  |  9/10/2014  | 
Event will showcase complex application security challenges
Sandia cyber-testing contributes to DHS Transition to Practice
Products and Releases  |  9/10/2014  | 
Innovative program will help Labs’ cybersecurity portfolio grow
ControlScan Brings UTM to the SMB
Products and Releases  |  9/10/2014  | 
Managed security services, Unified Threat Management technology combine to relieve IT security burden
Top web companies join Internet Slowdown protest for net neutrality
Products and Releases  |  9/4/2014  | 
Some of the world’s largest Internet companies -- including Etsy, Kickstarter, Mozilla, reddit, imgur, Foursquare, Vimeo, and Wordpress -- announced today that they will join Internet users and Battle for the Net activists for a creative action on September 10th.
Avira Partners with Dropbox to Bring Secure Sync and Share to Millions Around the Globe
Products and Releases  |  9/4/2014  | 
Peace of Mind and Seamless Sync for All
Porticor And Nscaled Partner To Deliver Secure And Compliant Business Continuity And Disaster Recovery For Cloud Data
Products and Releases  |  9/4/2014  | 
Porticor Adds Software-Defined Encryption Key Management to nScaled’s IT BCDR Platform for Protection of Replicated Data in the Cloud
Kofax Acquires Softpro GmbH
Products and Releases  |  9/4/2014  | 
Transaction Adds Signature Verification, Fraud Detection and Electronic Signature Capabilities to Kofax’s Smart Process Applications
Entrust, an SSL Digital Certificate and Services Leader, to Re-Join CA/Browser Forum
Products and Releases  |  9/3/2014  | 
Entrust formerly chaired the group for nearly seven years.
Easy Solutions Announces Support For DMARC, To Improve Global Email Health
Products and Releases  |  9/3/2014  | 
Clients Gain Significant Uplift in Attack Visibility, Improve Takedown Times Leveraging DMARC
MACH37 Launches the Fall 2014 Class of Cybersecurity Startups
Products and Releases  |  9/2/2014  | 
Six companies selected.
PandaLabs Q2 2014 Report: PUPs on the rise
Products and Releases  |  9/2/2014  | 
Malware still generated at a rate of 160,000 new samples a day in Q2 2014, reports PandaLabs.
HP Study Finds Nearly 70 Percent of IT Professionals Experience Weekly Phishing Attacks
Products and Releases  |  8/29/2014  | 
Six out of 10 attacks stem from malicious communication with the command and control site
Belden Introduces Versatile New Industrial Router and Security Appliance
Products and Releases  |  8/29/2014  | 
GarrettCom Magnum 10RX Features Designed to Benefit Power Utility and Transportation Industries
Trend Micro Adds VMware NSX Interoperability
Products and Releases  |  8/28/2014  | 
New capabilities solidify position in cloud and data center security
Netskope and Box Team Up
Products and Releases  |  8/28/2014  | 
Netskope gives IT a way to guide users to Box from unsanctioned apps, prevent data loss in Box across any endpoint, and ensure security for the OneCloud ecosystem
Security-as-a-Service Gets VMware Ready - vCloud Air Status
Products and Releases  |  8/27/2014  | 
Company Brings Managed IDS and Log Management Capabilities to vCloud Air Customers
Bayshore Networks® Announces Major Release of SingleView
Products and Releases  |  8/26/2014  | 
Bayshore’s management component now provides global management and access control for Pallaton™ policies and YARA rules.
Blue Coat Reveals Security Risks From "One-Day Wonders" Websites
Products and Releases  |  8/26/2014  | 
Research Study finds 470 Million Websites Exist for Less Than 24 hours; 22 Percent Used to Facilitate Attacks
Qubitekk To Receive Federal Funding To Help Protect Nation's Power Grid From Cyber Attack
Products and Releases  |  8/26/2014  | 
DOE provides $3 million grant for quantum encryption technology development.
Let the Hacking Begin: NYU Launches Largest Cyber Security Student Contests
Products and Releases  |  8/25/2014  | 
Yahoo Chief Information Security Officer Alex Stamos to Keynote 11th Annual NYU Polytechnic School of Engineering's Cyber Security Awareness Week Finals
Zumigo Raises $6M to Expand Secure Payments and eCommerce with Mobile Device Location and Identity Verification
Products and Releases  |  8/25/2014  | 
Intel Capital Leads Series B Financing; Latest Funding to Expand Company’s Delivery and Development of Mobile Location Intelligence Solutions Uniquely Authenticating and Securing Mobile Commerce
Survey: Impact of Target Data Breach on Cybersecurity Budget, Executive Awareness Diminishing
Products and Releases  |  8/25/2014  | 
Tripwire survey examines views of information security professionals at annual IT security conference
Lastline Secures $10 Million Funding Round
Products and Releases  |  8/25/2014  | 
Funding from Dell Ventures, Presidio Ventures, Redpoint Ventures and eVentures to Extend the Lastline Advanced Malware Defense Platform, Security Team and Strategic Partnerships
Gartner Says Worldwide Information Security Spending Will Grow Almost 8 Percent in 2014 as Organizations Become More Threat-Aware
Products and Releases  |  8/22/2014  | 
Analysts to discuss security trends at Gartner's 2014 Security and Risk Management Summits August 25-26 in Sydney, September 8-9 in London and September 15-16 in Dubai.
LogRhythm Launches Threat Intelligence Ecosystem and Related Security Analytics Suite to Detect High-Risk Cyber Threats
Products and Releases  |  8/22/2014  | 
CrowdStrike, Norse, Symantec, ThreatStream and Webroot Join Industry’s First and Only Threat Intelligence Ecosystem
Lumeta Joins Amazon Web Services Marketplace
Products and Releases  |  8/21/2014  | 
Lumeta ESI Real-Time Network Situational Awareness Now Available for AWS Subscribers
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0985
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

CVE-2014-0986
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

CVE-2014-0987
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

CVE-2014-0988
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

CVE-2014-0989
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Best of the Web
Dark Reading Radio