Products and Releases
Latest Content
Page 1 / 2   >   >>
Startup Virtru Supporting Sensitive Work of Nonprofits
Products and Releases  |  6/29/2015  | 
Secure, End-to-End Email Encryption Provides Nonprofits With the Ability to Share Sensitive Information, Fostering Collaboration, Convenience and Compliance
Products and Releases  |  6/26/2015  | 
Intel Security Technologies to be Included in Honeywell’s Industrial Cyber Security Solutions for Process Control
Waratek Makes Apps Self-Testing and Self-Protecting
Products and Releases  |  6/26/2015  | 
AppSecurity for Java Product Uses Outputs from Leading Application Security Testing Tools to Virtually Patch Flaws without Any Code Changes
Survey Shows Insider Threats on the Rise: Organizations Experience an Average of 3.8 Attacks per Year
Products and Releases  |  6/26/2015  | 
Survey by Crowd Research Partners Shows Endpoints Are by Far the Most Common Launch Point for an Insider Attack; Highlights Need for Robust Endpoint Security and Policies
Tanium Unveils New Forensics Capability For Incident Response
Products and Releases  |  6/26/2015  | 
New innovation within industry-leading platform dramatically accelerates investigations across millions of endpoints in seconds; only platform to bridge Security and IT Operations for closed-loop endpoint security
CENTRI Joins Cloud Security Alliance
Products and Releases  |  6/26/2015  | 
Data Security Software Provider to Contribute Expertise on Data Encryption and Optimization with CSA Activities
Survey: Most Enterprises Don't Fix 60 Percent of Security Vulnerabilities
Products and Releases  |  6/26/2015  | 
More than half take three Months to remediate flaws, according to a joint survey by Waratek at Gartner Security and Risk Management Summit
Survey: 86 Percent of Energy Security Professionals Believe They Can Detect a Breach on Critical Systems in Less Than One Week
Products and Releases  |  6/26/2015  | 
Tripwire survey compares cybersecurity views of 400 energy executives and IT professionals
Most Enterprises Do Not Fix 60 Percent of Security Vulnerabilities they Discover
Products and Releases  |  6/26/2015  | 
More than half take Three Months or More to Remediate Flaws According to Survey Conducted by Waratek at Gartner Security and Risk Management Summit
Skyhigh Cloud Report: Average Healthcare Organization Uploads 6.8 TB of Data Per Month
Products and Releases  |  6/26/2015  | 
Analysis is Based on Actual Usage Data for Over 1.6 Million Employees at Healthcare Providers and Payers
Fidelis Cybersecurity Survey Shows Lack of Trust, Limited Visibility and Knowledge Gap between the Board and IT Security Professionals
Products and Releases  |  6/25/2015  | 
New survey from Ponemon Institute and Fidelis underscores how the divide adds risk against advanced threats
HackerOne Raises $25 Million to Make the Internet Safer
Products and Releases  |  6/24/2015  | 
New Enterprise Associates leads Series B financing with participation from existing investors including Benchmark and additional investment from Yuri Milner, Marc Benioff, Drew Houston and Jeremy Stoppelman
Zscaler Announces Record Q3 Growth
Products and Releases  |  6/24/2015  | 
ProtectWise Appoints Former Commander Of Army Cyber Command To Advisory Board
Products and Releases  |  6/23/2015  | 
Lieutenant General Rhett A. Hernandez, U.S. Army (Retired) Named Company's First Strategic Advisor
Pulse Secure Appoints Sudhakar Ramakrishna as Chief Executive Officer and Board Member
Products and Releases  |  6/23/2015  | 
Former Citrix SVP and GM Brings Nearly 25 Years of Strategy, Business Management and Team Building Experience
Moving Towards Secure PHI In The Cloud, Prescription Savings Company Adopts Managed Encryption Services
Products and Releases  |  6/23/2015  | 
Rx Savings Solutions blends FireHost’s secure managed cloud and encryption service based on Vormetric technology to protect ePHI, comply with HIPAA
SRI International Releases New Game for DARPA Crowd-Sourced Software Verification Program
Products and Releases  |  6/23/2015  | 
Citizen scientists interested in cybersecurity can now play Binary Fission at
DigiCert Acquires Verizon Enterprise SSL Business
Products and Releases  |  6/23/2015  | 
Growing roster of enterprises to benefit from industry-leading certificate management services; Verizon to continue to offer SSL Certificates as DigiCert reseller
Malwarebytes Acquires Junkware Removal Tool
Products and Releases  |  6/22/2015  | 
Acquisition of popular security tool reinforces Malwarebytes’ commitment to fighting against potentially unwanted programs (PUPs)
Products and Releases  |  6/19/2015  | 
Cybersecurity Firm Provides Retroactive Security by Removing Access to Email and Files Even after They Have Left a Company’s Network
Vera Secures Files with Microsoft Office 365
Products and Releases  |  6/19/2015  | 
Create Documents with Office 365, Store in OneDrive, Dropbox, or Box, and Secure with Vera Strong Encryption, Granular Access Policies, and a Built-In Kill Switch for All Office Files No Matter Where They Are Stored
Latest Research Highlights Growing Insider Threat in Cybersecurity Landscape
Products and Releases  |  6/19/2015  | 
The Insider Threat Spotlight Report, sponsored by Watchful Software, calls attention to major threat/risk vector and potential lack of preparedness for data breach.
EiQ Networks Leverages Critical Security Controls to Deliver Proactive Compliance Management
Products and Releases  |  6/19/2015  | 
First Solution to Map SANS Critical Security Controls to Compliance Frameworks for Improved Security
Pindrop Security Reveals Financial and Retail Institution Call Centers See 30 Percent Rise in Phone Fraud
Products and Releases  |  6/17/2015  | 
Consumers receiving more than 86.2 million phone scam calls per month in U.S.
Cyber-Security Startup Ensilo Announces $10m Funding For Preventing Threat Actors From Extracting Key Data In Real-Time
Products and Releases  |  6/15/2015  | 
Series A Funding from Lightspeed Venture Partners and Carmel Ventures Will Enable enSilo’s Data-Exfiltration Prevention Approach to Expand in the US Market
Fastly Adds Key Enterprise Security Leadership
Products and Releases  |  6/15/2015  | 
Window Snyder, Security Veteran of Apple, Mozilla, and Microsoft, Joins Growing Cloud Infrastructure Company
Acuant Survey: Companies Look to the Cloud for Better Information Capture, Verification and Collaboration
Products and Releases  |  6/15/2015  | 
Identity verification lags even as 84% consider it ‘critical’ or ‘very important’ in the card scanning process
vArmour Offers New vArmour DSS-VFree, Downloadable Application-Level Visibility Solution
Products and Releases  |  6/10/2015  | 
vArmour empowers IT professionals to visualize complex applications in virtual and cloud environments
Dataguise Introduces Big Data Security Suite for On-Premise and Cloud Deployments
Products and Releases  |  6/9/2015  | 
Company Delivers DgSecure 5.0 to Provide Insight and Access to Different Sensitive Data Classifications
EY escalates battle against cybercrime with launch of managed security operations center
Products and Releases  |  6/9/2015  | 
 EY to invest more than US$20m in its Managed Security Operations Center, increasing its cybersecurity workforce six-fold by 2020  New Center to use advanced analytics to predict and prevent future cyber threats
New Study Shows How Strategic, Or Not, Security Is To Chief Execs
Products and Releases  |  6/9/2015  | 
While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network
Entrust Datacard Integrates with Citrix Mobility Solution to Empower Mobile
Products and Releases  |  6/9/2015  | 
Integration between Entrust IdentityGuard authentication and credential management capabilities with XenMobile enable secure anytime-anywhere productivity for the mobile workforce
Tenable Extends Capabilities to Assure Security Across Complex IT Environments
Products and Releases  |  6/9/2015  | 
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets.
Tenable Network Security Extends Capabilities of Nessus Agents
Products and Releases  |  6/9/2015  | 
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets
Products and Releases  |  6/9/2015  | 
Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.
New Survey Reveals Limited Enterprise Ability to Respond to Attacks on the Trust Provided by Keys and Certificates
Products and Releases  |  6/8/2015  | 
RSA Survey of Nearly 850 IT Security Professionals Finds They Don’t Know How to Detect and Respond to Key and Certificate Vulnerabilities
Ping Identity Announces Enhanced Partner Program to Strengthen Security in a Borderless World
Products and Releases  |  6/8/2015  | 
Program Offers Partners Opportunity to Capitalize on Rapid Growth of Predicted $18 Billion Identity Access Management Market
Ping Identity Unveils Identity Defined Security Platform to Enable Fluid and Trusted Interactions in a Connected, Mobile World
Products and Releases  |  6/8/2015  | 
New Features Include Multi-factor Authentication Support for Apple Watch, Enterprise Grade Identity as a Service and Comprehensive Web Access Management and API Security Solution
Menlo Security Emerges From Stealth to Eliminate Threat of Malware, Adds $25 Million in Series B Funding
Products and Releases  |  6/8/2015  | 
Industry’s first Isolation Platform already trusted by Fortune 500 companies, now ready for global market
Page 1 / 2   >   >>

Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-06-29
CRLF injection vulnerability in IBM WebSphere Commerce 6.0 through and 7.0 before Cumulative iFix 2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.

Published: 2015-06-29
EMC Unisphere for VMAX 8.x before sets up the Java Debugging Wire Protocol (JDWP) service, which allows remote attackers to execute arbitrary code via unspecified vectors.

Published: 2015-06-29
IBM InfoSphere DataStage 8.1, 8.5, 8.7, 9.1, and 11.3 through on UNIX allows local users to write to executable files, and consequently obtain root privileges, via unspecified vectors.

Published: 2015-06-28
IBM Unified Extensible Firmware Interface (UEFI) on Flex System x880 X6, System x3850 X6, and System x3950 X6 devices allows remote authenticated users to cause an unspecified temporary denial of service by using privileged access to enable a legacy boot mode.

Published: 2015-06-28
Cross-site request forgery (CSRF) vulnerability in IBM Security Network Protection 5.3 before 5.3.1 allows remote attackers to hijack the authentication of arbitrary users.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report