Products and Releases
Latest Content
Page 1 / 2   >   >>
15th Member of Washington, D.C.-Based Identity Theft Ring Pleads Guilty
Products and Releases  |  1/26/2015  | 
Defendant Admits To Targeting Parents Of Hospitalized Children, Among Others
Ad Networks Just Got More Secure
Products and Releases  |  1/26/2015  | 
New ad network puts users first, combines beautiful user experience with best in class privacy controls
SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity
Products and Releases  |  1/26/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources; SolarWinds Examines Policies, Processes and Threat Prevention Tools to Address Lack of Internal Visibility
Bitglass Breach Discovery Limits Damage From Data Breaches
Products and Releases  |  1/21/2015  | 
Automated Service Enables Enterprises to Discover Data Breaches Early
Adroit Digital Study Reveals Consumer Data Privacy and Security Concerns as President Obama Talks Cybersecurity in State of the Union
Products and Releases  |  1/21/2015  | 
70% believe the government isn’t protecting their online privacy; a majority are most concerned about privacy and security on social media
Updated for 2015: Tools Designed to Manage Third Party Risk
Products and Releases  |  1/21/2015  | 
Shared Assessments Program Tools Empower Vendor Management Confidence
Vormetric’s 2015 Insider Threat Report: 93% of U.S. Organizations Polled Vulnerable to Insider Threats
Products and Releases  |  1/21/2015  | 
Report Follows Record Year of Data Breaches; Reveals Spending Priorities, Security Risks
Online Trust Alliance Determines Over 90 Percent of Data Breaches in First Half of 2014 Could Have Been Easily Prevented
Products and Releases  |  1/21/2015  | 
Findings in newly released OTA Data Protection Best Practices and Risk Assessment Guides
ForgeRock and FireEye Join Forces to Detect Cyber Attacks with Identity-Aware Threat Intelligence Solution
Products and Releases  |  1/21/2015  | 
Integration of FireEye Threat Analytics Platform and the ForgeRock Identity Platform to Enable Organizations to Correlate Identity-Based Intrusions with Enterprise-wide Threat Indicators
RiskIQ Finds More Than 11 Percent of Android Banking and Finance- Related Apps are Suspicious
Products and Releases  |  1/21/2015  | 
Research of 350,000 Mobile Apps across 90 App Stores Reveals 40,000 Containing Malware or Suspicious Binaries
SQL Injection Vulnerabilities Surge
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Websense Transformation Delivers New TRITON® APX 8.0 Platform
Products and Releases  |  1/13/2015  | 
Websense Addresses Skills Gap with TRITON APX 8.0, the Result of 18 Months of Business Transformation & Innovation.
EyeLock's myris Is First and Only Iris Authenticator for New FIDO Open Industry Standard
Products and Releases  |  1/5/2015  | 
FIDO Ready(TM) certified device for universal strong authentication, myris provides consumers and enterprises with unprecedented security
Silent Circle Appoints Bill Conner CEO
Products and Releases  |  1/5/2015  | 
Former Entrust CEO, Nortel President Also Joins Board of Directors of Silent Circle, Blackphone
Onapsis Research Labs Delivers 2014 SAP Security Advisories Trend Analysis with Almost Half Classified as ‘High priority’
Products and Releases  |  12/29/2014  | 
Business-critical application security experts deliver 2014 SAP security trend analysis and find 7% increase over 2013 with 46% of vulnerabilities ‘high priority’ including HeartBleed, Shellshock, Poodle and Zombie Zero
Pulse Secure Simplifies Secure Device Onboarding and Compliance for BYOD
Products and Releases  |  12/22/2014  | 
New Capabilities of Connect Secure and Policy Secure Will Enhance End-User Experience and Expand Compliance Options
WatchGuard Uncovers Guest Network Security Lapses
Products and Releases  |  12/18/2014  | 
71% of global hotels, restaurants and other hospitality organizations jeopardize customers with inadequate security controls
IOActive Expands Vehicle Security Service Practice
Products and Releases  |  12/17/2014  | 
Vehicle security researcher Charlie Miller joins IOActive Advisory Board
Onapsis uncovers two new critical business application vulnerabilities in SAP BASIS and SAP BusinessObjects
Products and Releases  |  12/17/2014  | 
High-profile risk threats identified by Onapsis Research Labs experts reveals that unauthorized users could access business-critical applications leveraging SAP BusinessObjects
Esentire Releases Cybersecurity Documentation Framework Featuring Infosec Policy, Incident Response Guidance
Products and Releases  |  12/17/2014  | 
Culled from years of industry expertise, this Information Security Policy Framework provides Registered Investment Advisors the means to proactively document and manage their defense posture while responding to due diligence and regulatory requirements.
Rapid7 Announces Additional Funding
Products and Releases  |  12/17/2014  | 
$30 Million Investment to Accelerate Growth and Strong Traction of New Security Data Analytics and Strategic Services Offerings
Entrust Datacard Adds Website Security Capabilities For SSL
Products and Releases  |  12/17/2014  | 
SSL Technology Bundle Utilizes SiteLock Website Security Services to Protect Against Malicious Online Attacks and Create Multiple Levels of Protection
Lastline Adds OS X Support and Unlimited 10 Gbps Sensors in 6.0 Release of Its Breach Detection Platform
Products and Releases  |  12/16/2014  | 
Lastline Next-Generation Sandboxing, Threat Intelligence and Breach Event Correlation Engineered to Handle 20x Increase in Evasive Malware
Lancope® Unveils Newly Enhanced, World-Class Customer Success Organization to Help Drive Lean-Forward Cyber Security
Products and Releases  |  12/16/2014  | 
Company has increased its investment in customer success by 150 percent this year
Trend Micro Announces Strategic OEM Agreement with HP
Products and Releases  |  12/16/2014  | 
HP TippingPoint Advanced Threat Appliance family includes Trend Micro Deep Discovery for breach detection
Breaking News From KnowBe4: Two New Ransomware Strains
Products and Releases  |  12/15/2014  | 
KnowBe4 CEO Stu Sjouwerman issued a warning today of two new strains of ransomware that have been discovered, giving IT security a heads up on how to spot and handle
Norse Discovers Buffer Overflow Vulnerability In FreeBSD
Products and Releases  |  12/11/2014  | 
NCC Group to Open Trust Domain For Registration
Products and Releases  |  12/11/2014  | 
Denim Group Enhances ThreadFix to Deepen Application Vulnerability Management and Remediation Capabilities
Products and Releases  |  12/10/2014  | 
December 9 Webinar will Demonstrate Latest ThreadFix Features and Detail Practical Steps for Accelerating Application Security Programs
Vectra Networks Launches Industry’s First Real-Time Detection Platform that Protects against Insider and Targeted Threats
Products and Releases  |  12/10/2014  | 
Organizations Can Now Leverage Unique Combination of Community Threat Analysis and Real-Time Indicators of Attack for Comprehensive Insight into Insider and Targeted Threats
Imperva Expands Protection Against Distributed Denial of Service Attacks
Products and Releases  |  12/10/2014  | 
New DDoS Services Add Infrastructure Protection and Name Server Protection to DDoS Capabilities
Box Advances Enterprise Security with Box Trust
Products and Releases  |  12/9/2014  | 
Symantec, Splunk, Palo Alto Networks, Sumo Logic and OpenDNS Join Ecosystem of Leading Security Partners
TraceSecurity and Rapid7 Partner to Add Value for Shared Customer Base
Products and Releases  |  12/9/2014  | 
Relationship Delivers Seamless Integration between TraceCSO and Nexpose Vulnerability Management Software
82% of Companies Attacked Online In 2014: Malwarebytes Research
Products and Releases  |  12/9/2014  | 
Research reveals browser vulnerabilities present companies with the biggest endpoint challenge heading into 2015.
McAfee Labs Report Previews 2015 Developments in Exploits and Evasion
Products and Releases  |  12/8/2014  | 
McAfee Labs Dubs 2014 “Year of Shaken Trust”; Predicts 2015 Trends in Internet Trust Exploits, Privacy, Mobile, Internet of Things, and Cyber Espionage
Denim Group Enhances ThreadFix to Deepen Application Vulnerability Management and Remediation Capabilities
Products and Releases  |  12/8/2014  | 
December 9 Webinar will Demonstrate Latest ThreadFix Features and Detail Practical Steps for Accelerating Application Security Programs
TrustPipe Rolls Out Marker-Based Security Technology
Products and Releases  |  12/8/2014  | 
Blue Coat Names Michael Fey President and COO
Products and Releases  |  12/4/2014  | 
Fey’s Expertise Positions Blue Coat to Drive Continued Growth Towards $1B Revenue in the Security Market
Merchant Financial Cyber Partnership Announces Next Steps for Securing the Payments System
Products and Releases  |  12/4/2014  | 
Partnership sends letter to Congress outlining cybersecurity information sharing legislation principles
Shortcomings Identified Among Security Vendors in Latest Evaluation of Advanced Threat Solutions
Products and Releases  |  12/4/2014  | 
FireEye Outperforms Mainstream Security Providers in New Advanced Malware Test.
National Health ISAC Offers Industry Threat Intelligence Platform
Products and Releases  |  12/4/2014  | 
Healthcare Industry Promotes Collaboration and Information Sharing to Take Lead in Fighting Online Threats
Array Networks Announces Mobile Client for Integrating SSL VPN Secure Access and Mobile Application Management
Products and Releases  |  12/4/2014  | 
New MotionPro app enables secure access from tablets and smart phones and streamlines management of native, Web and remote desktop applications.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.