Products and Releases
Latest Content
Page 1 / 2   >   >>
Trustwave Unveils Federated Global Security Operations
Products and Releases  |  9/29/2016  | 
Global Network of Federated, Advanced Security Operations Centers powered by Trustwave Ushers in the Next Generation of Cybersecurity Protection
Lenovo, Intel, Paypal And Synaptics Announce Collaboration To Bring Fido Authentication To Laptops
Products and Releases  |  9/22/2016  | 
ENOVO, INTEL, PAYPAL AND SYNAPTICS REVEAL COLLABORATION TO BRING A SIMPLE AND SAFE ONLINE AUTHENTICATION TO PCS WITH THE INDUSTRYS FIRST FIDO-ENABLED EMBEDDED FINGERPRINT SOLUTION.
White Ops Increases Market Momentum with $20 Million Series B
Products and Releases  |  9/19/2016  | 
Funding from Paladin Capital Group and Grotech Ventures Will Accelerate Innovation and Expand Sales and Marketing Footprint
Symantec Endpoint Protection Cloud Secures SMBs Against Growing Threats
Products and Releases  |  9/17/2016  | 
65 Percent of Targeted Attacks are Launched Against Small and Mid-sized Businesses to Steal Confidential Customer Information for Financial Gain.
Trusona Releases Cloud Identity Suite and Launches the #NoPasswords Revolution
Products and Releases  |  9/17/2016  | 
Trusona Essential is Free and Designed to Eliminate Passwords to Create a Safer Internet
Introducing A New Secure Memory Stick
Products and Releases  |  9/16/2016  | 
Centrifys Survey Finds Consumers More Concerned with Financial Data Getting Hacked than Private Information about Their Families Being Exposed
Products and Releases  |  9/16/2016  | 
Survey also reveals consumers more likely to hear about data breaches from the news or social medianot from companies holding their data.
Optiv Security Launches Technology-Enabled Third-Party Risk Managed Service
Products and Releases  |  9/16/2016  | 
Enables Companies to Better Manage Entire Vendor, Supplier and Business Associate Risk Management Lifecycles, Improving Compliance and Risk Management
IoT Village at DEF CON 24 Uncovers Extensive Security Flaws in Connected Devices
Products and Releases  |  9/16/2016  | 
Researchers Discover 47 New Security Vulnerabilities across 23 Devices and 21 Manufacturers; Executive Leadership from FTC and FCC Weigh in.
New report: 12 hot markets for cybersecurity jobs
Products and Releases  |  9/16/2016  | 
Randstad Technologies Announces 12 Markets with High Demand for Cybersecurity Talent
Bay Dynamics Announces Major Enhancements to Flagship Cyber Risk Analytics Platform
Products and Releases  |  9/16/2016  | 
New Version of Risk Fabric Prioritizes Threats and Vulnerabilities, Deputizes Line-of-Business Leaders and Automates Cyber Risk Management
Vectra Networks Takes On Backdoors in Data Center Firewalls Planted by Advanced Adversaries
Products and Releases  |  9/15/2016  | 
These attack vectors are aimed at blind spots in all network and server infrastructure
HPE Aruba Introduces Developer-Ready Mobile First Platform to Unlock the Potential of Modern IT Infrastructures
Products and Releases  |  9/13/2016  | 
Aruba Mobile First Platform Provides Real-Time Insights to Improve User Experiences and IoT Security; New Partner Ready for Networking Program Expands Revenue Opportunities for the Channel
Anomali and Department of Homeland Security Collaboration Enables Groundbreaking Automated Public/Private Sector Cybersecurity Information Sharing
Products and Releases  |  9/12/2016  | 
Automated, Anonymized Public/Private Threat Intelligence Sharing Enables More Effective Protection of National Critical Infrastructure and Attacks Against U.S. Organizations
iovation Acquires LaunchKey, Combines Global Fraud Intelligence and Transparent Authentication with Dynamic Multifactor Authentication
Products and Releases  |  9/7/2016  | 
Branded for the business, the combined solution gives organizations a path to the future of authentication, while giving their customers more trust and confidence than ever before
XOR Data Exchange employs Dark Web in fighting fraud
Products and Releases  |  8/31/2016  | 
Startup offers comprehensive identity theft protection through data synthesis
Bay Dynamics Announces Major Enhancements to Flagship Cyber Risk Analytics Platform
Products and Releases  |  8/29/2016  | 
New Version of Risk Fabric Prioritizes Threats and Vulnerabilities, Deputizes Line-of-Business Leaders and Automates Cyber Risk Management
Accenture to Acquire Australian Security Company Redcore
Products and Releases  |  8/23/2016  | 
Acquisition Will Expand Accenture Securitys Offerings, Presence in Asia-Pacific
CrowdStrike Expands eCrime Offerings for Organizations to Combat Rampant Financially Motivated Cyber Attacks
Products and Releases  |  8/15/2016  | 
New Tiered Packages Provide Customers with Enhanced Threat Intelligence Reporting
Accenture Launches New FusionX Incident Response Services Globally
Products and Releases  |  8/15/2016  | 
New capability mimics adversarial thinking to help organizations understand, mitigate cyber threats
Untangle Announces Revolutionary Wi-Fi Router Operating System
Products and Releases  |  8/10/2016  | 
New OS for Home Wi-Fi Routers Includes Full NGFW Features
Kudelski Security Expands Into U.S. Market to Address Demand for Advanced Cybersecurity Solutions
Products and Releases  |  8/10/2016  | 
Swiss cybersecurity leader brings unmatched history of innovation, deep engineering expertise and a new solutions perspective to help defend against advanced threats, ongoing attacks
Attivo Networks Launches Attack Path Vulnerability Assessments for Continuous Threat Management at Black Hat
Products and Releases  |  7/27/2016  | 
ThreatMatrix Detection Platform Expands, Providing Attack Path Prediction, Enhanced Deception Techniques and Support for Routed Networks
TrapX Evolves Deception-Based Network Security Beyond IT
Products and Releases  |  7/27/2016  | 
New DeceptionGrid 5.2 Provides Emulations for Point-of-Sale Systems and Medical Devices as Well as Industrys First Mac OS Emulation
Acalvio Technologies Emerges from Stealth Mode with $17 Million Investment from Accel Ventures, Ignition Partners, Eileses Capital
Products and Releases  |  7/27/2016  | 
Unveils Deception 2.0 Technology for Advanced Threat Defense
Indegy Lands $12M in Series A Financing to Protect Critical Infrastructures from Cyber Threats
Products and Releases  |  7/26/2016  | 
Round Led by Vertex Ventures; Funds will be Used to Expand Sales, Marketing and Customer Support
Third-Party Cyber Risk Management Platform Company CyberGRX Closes $9M Series A Funding
Products and Releases  |  7/22/2016  | 
Allegis Capital Leads Round with Participation from Major Cybersecurity Investors; Platform Being Developed in Close Collaboration with Early Adopters at Leading Institutions
Edward Snowden speaking at SecTor 2016
Products and Releases  |  7/14/2016  | 
Twistlock Secures $10 Million in Series A Funding
Products and Releases  |  7/7/2016  | 
TenEleven Ventures Leads the Series A Round With Rally Ventures and Existing Investor YL Ventures
Veriflow Secures Series A Funding to Drive Innovation in Preventing Change-Induced Outages and Breaches in Networks
Products and Releases  |  7/6/2016  | 
Menlo Ventures Leads $8.2 Million Funding Round as Veriflow Takes Next Steps in Adoption of Mathematical Network Verification
DDoS Extortion Campaigns to Threaten 80% of European Businesses in the Next Year
Products and Releases  |  7/6/2016  | 
European IT security professionals call upon Internet Service Providers to offer business customers more robust and proactive cyber security protection against growing DDoS ransom threat
Cyber Security Company Darktrace in $65 million Fundraise to Accelerate Global Expansion in Round led by KKR
Products and Releases  |  7/6/2016  | 
TenEleven Ventures, SoftBank-affiliated Fund Also Join Existing Investors Invoke Capital and Summit Partners
Virtru Sets a New Standard for Seamless Data Protection by Allowing Users to Search Full Text of Encrypted Content
Products and Releases  |  7/5/2016  | 
With Industry's First Privacy-Preserving Encrypted Search, Users Can Now Search and Find Encrypted Content Without Weakening Data Protections or Exposing Content to Any Third Party
PacketSled Secures $5M in Series A Financing
Products and Releases  |  6/28/2016  | 
Continuous security monitoring company to aggressively accelerate sales, marketing, and execution of product roadmap
67 Percent of Used Drives Sold on eBay and Craigslist Hold Personally Identifiable Information and 11 Percent Contain Sensitive Corporate Data
Products and Releases  |  6/28/2016  | 
Blancco Technology Group Study Uncovers Exposed Social Security Numbers, Financial Data, Resumes, Company Emails, CRM Records and Spreadsheets
Internet Pioneer Discusses Creation, Expectations and Security of DNS on Its 33rd Birthday
Products and Releases  |  6/23/2016  | 
"The Internet community has let legacy infrastructure designs constrain the future."
Zimperium Closes $25 Million Series C Funding Led By Warburg Pincus
Products and Releases  |  6/20/2016  | 
Mobile defense leader will use financing to expand global customer reach
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.