Products and Releases
Latest Content
Page 1 / 2   >   >>
PCI Council Publishes Guidance On Penetration Testing
Products and Releases  |  3/26/2015  | 
Recommendations to help organizations address top security challenge area.
Startup Hot Seat: Four Enterprise Tech Startups Chosen to Pitch Ideas to IT Community at Interop Las Vegas
Products and Releases  |  3/26/2015  | 
Non-Profits and Industry Associations Explore New IT Standards in Future of Tech Sessions
Cylance Researchers Discover Critical Vulnerability Affecting Hotel Chains Worldwide
Products and Releases  |  3/26/2015  | 
Millions of Customers Using Guest WiFi Potentially Impacted
Menlo Security Finds High Risk in Trusted Websites
Products and Releases  |  3/25/2015  | 
"State of the Web 2015: Vulnerability Report" identifies one in three top Alexa websites as risky
Black Lotus Quarterly Threat Report Reveals Average DDoS Attack Tripled in Volume
Products and Releases  |  3/25/2015  | 
Total attack frequency drops 44 percent in Q4 2014, confirming company’s forecast of fewer, more complex methods
Blue Coat Global Intelligence Network Helps Customers Block, Detect and Respond to Advanced Threats
Products and Releases  |  3/25/2015  | 
Unification of Products and Labs Produces Single Stream of Web and Malware Threat Intelligence to Deliver Unprecedented Protection While Reducing the Total Cost of Security
Windows Server 2003 End-of-Life Survey Finds Nearly One in Three Companies Will Miss Deadline, Leaving Nearly 3 Million Servers Vulnerable to Breach
Products and Releases  |  3/25/2015  | 
Poll of 500 U.S. and U.K. enterprises finds more than half do not know deadline date
Game App Embarrassment Illustrates Bring Your Own Device (BYOD) Risk for Enterprises, According to New Flexera Software/IDC Survey Report
Products and Releases  |  3/25/2015  | 
Most enterprises are not testing mobile apps for risky behaviors that could invite hidden, ‘back-door’ security risk and reputational damage
ProtonMail Raises $2M USD
Products and Releases  |  3/25/2015  | 
High security email service dramatically accelerating development to meet immense demand
Protectwise Emerges From Stealth With More Than $17 Million In Funding To Launch World’s First Cloud DVR For Enterprise Security
Products and Releases  |  3/24/2015  | 
Disruptive Platform Creates a Long Term, Full-Fidelity Network Memory in the Cloud with a Time Machine for Threat Detection
BeyondTrust Survey Finds That More Than One Out of Four Organizations Have No Controls Over Privileged Access
Products and Releases  |  3/24/2015  | 
Fragmented priorities, total cost of ownership seen as inhibitors of enterprise adoption
Raketu Intros Secure, Private Moblle Messaging App
Products and Releases  |  3/24/2015  | 
Privacy features lets you delete sent messages on receiver's device; eliminates 'text regret.'
IOActive Launches New Hardware Lab
Products and Releases  |  3/23/2015  | 
Company adds new Global 50 clients to roster, expands into Middle East
New York City Police Department Auxiliary Officer Charged with Hacking into NYPD Computer and FBI Database
Products and Releases  |  3/19/2015  | 
Defendant Obtained Personal Identifying Information of Traffic-Accident Victims and Fraudulently Posed as an Attorney Soliciting Clients
Waratek Provides Detection of SQL Injection Attacks
Products and Releases  |  3/19/2015  | 
Waratek AppSecurity for Java Product Eliminates False Positives Associated with Heuristic and Signature-based Solutions including WAFs
Over a third of US IT professionals plan to launch an insider threat program this year
Products and Releases  |  3/19/2015  | 
Continual high-profile internal security breaches prompt a surge in preventative measures against insider threat
Intermedia AppID™ Enterprise Increases Security and Improves User Experience with a New Password Management Solution
Products and Releases  |  3/12/2015  | 
Intermedia AppID Enterprise implements Dynamic Password Management to reduce human interaction with web application passwords
HP Granted FedRAMP Authorization for Government Agencies to Use HP Fortify on Demand
Products and Releases  |  3/12/2015  | 
HP Fortify on Demand First Security Software-as-a-Service (SaaS) Offering to Achieve Approval
Blue Coat to be Acquired by Bain Capital
Products and Releases  |  3/11/2015  | 
Deal valued at $2.4 Billion, Prepares Company for Return to Public Markets
CloudFlare Solves an Industry-Wide DNS Security Problem, Shields DNS Infrastructure from Attacks
Products and Releases  |  3/11/2015  | 
Virtual DNS Protects and Supercharges DNS Servers, Mitigating one of the Most Common Infrastructure Vulnerabilities—Distributed Denial of Service Attacks (DDoS)
Check Point Introduces Threat Extraction for Zero Malware in Zero Seconds
Products and Releases  |  3/11/2015  | 
New Anti-Threat Solution Ensures the Fastest 100% Removal of Threats
Three Defendants Charged with One of the Largest Reported Data Breaches in U.S. History
Products and Releases  |  3/6/2015  | 
One Of The Defendants Has Already Pleaded Guilty
Healthcare Organizations Lack Tools for Cyber Situational Awareness and Threat Assessment
Products and Releases  |  3/4/2015  | 
HITRUST Transforms Model for Effective Cyber Risk Management
Cloud Security Alliance Announces Release of Security Framework for Governmental Clouds
Products and Releases  |  3/4/2015  | 
Report jointly developed by CSA, ENISA and TU Darmstadt Provides Step-by-Step Approach for the Procurement and Secure Use of Cloud Services
News: RADAR goes international/manages breaches in EU
Products and Releases  |  3/4/2015  | 
Award-winning Incident Response Management Software Streamlines EU Data Breach Notification Obligations to Make Managing Security Incidents Even Easier
Dtex Systems Closes $15M Series A Funding to Expand to U.S. Market and Relocate Headquarters to Silicon Valley
Products and Releases  |  3/3/2015  | 
Dtex’s Endpoint Security Technology Provides Comprehensive Insider Threat Protection and Safeguards Employee Privacy to Uphold International Privacy Laws
PandaLabs neutralized 75 million new malware samples in 2014, twice as many as in 2013
Products and Releases  |  3/3/2015  | 
PandaLabs recorded an average of 200,000 new malware strains per day; and 34% of all malware ever created was coded in 2014.
Hypori Unveils Virtual Mobile Infrastructure at Mobile World Congress
Products and Releases  |  3/3/2015  | 
First Public Demonstration of Android Cloud Environment Ushers in Next-Generation of Secure BYOD
Survey Report: Majority of Service Providers Experienced DDoS Attacks, 85 Percent Experienced Customer Churn As a Result
Products and Releases  |  3/2/2015  | 
Nearly all participants have a solution in place, but most are insufficient
Proofpoint Signs Definitive Agreement to Acquire Emerging Threats; Enhances Threat Intelligence, Detection and Response
Products and Releases  |  3/2/2015  | 
Acquisition of leading threat intelligence company will extend Proofpoint’s solutions for detecting and responding to advanced threats
VOIPSEC Launches ‘Voice Firewall’ Solution For Cost-Effective Voice-Over-Ip Security
Products and Releases  |  3/2/2015  | 
-Cloud-based, freemium model provides SMEs with essential first tier of voice security, mitigating increasing risk of VoIP infrastructure breaches-
Tempered Networks Raises $15 million in Series A Funding
Products and Releases  |  3/2/2015  | 
Led by Ignition Partners with participation from IDG Ventures, funding furthers commitment to protecting critical infrastructure and information against cyber security threats
Radware Introduces New Attack Mitigation Platform for High Volume Cyber-Attacks
Products and Releases  |  3/2/2015  | 
Latest Radware platform boasts up to 300Gbps mitigation capacity and handles 230 million packets per second of attack traffic to defend against evolving and growing cyber-attacks
Emailage Raises $3.8 Million
Products and Releases  |  2/26/2015  | 
Funding is led by Felicis Ventures, the leader in early-stage startup funding with an aggregate enterprise investment exit value of $7.5 billion
BMC and Qualys Join Forces to Improve Enterprise Security
Products and Releases  |  2/26/2015  | 
Integrated solution combines BMC BladeLogic and Qualys Vulnerability Management to quickly identify and remediate threats and boost collaboration between Security and IT Operations teams
Onapsis Uncovers Five New Vulnerabilities Affecting SAP BusinessObjects and SAP HANA
Products and Releases  |  2/25/2015  | 
High-profile cyber-risks reveal unauthorized users could retrieve and overwrite data stored on business-critical systems
Lumeta Announces Strategic Partnership with Nordisk Systems, Inc.
Products and Releases  |  2/24/2015  | 
Offers Customers a Solution to Network Situational Awareness Challenges
Digital Guardian Launches Digital Guardian 7.0 for Data Protection Against All Threats
Products and Releases  |  2/24/2015  | 
Company Extends Proven Data Protection Capabilities for Insider Threats to Defend Against Outside Attacks and Bridge the Gap Between Systems Security and Data Protection
Onapsis Appoints CTO of Veracode, Chris Wysopal, to Board of Advisors
Products and Releases  |  2/23/2015  | 
Cyber security expert, thought leader and entrepreneur to help Onapsis further transform how organizations approach business-critical application security
Tenable Network Security Introduces Agent-Based Scanning to 2015 Product Line with Debut of Nessus Manager
Products and Releases  |  2/20/2015  | 
Nessus® Agents simplify, automate and extend vulnerability management capabilities by performing offline scans of portable devices without the need for privileged credentials
Fluke Networks Makes Dynamic Responses to Wireless Threats and True “No-Wireless” Zones Realities with New Capabilities in AirMagnet Enterprise
Products and Releases  |  2/20/2015  | 
For the organizations that need it most, AirMagnet Enterprise provides nonstop detection, location, alerting, mitigation and reporting on cellular and Wi-Fi security breaches
Pindrop Security Closes $35 Million Investment to Extend Leadership in Call Center Anti-Fraud and Authentication
Products and Releases  |  2/19/2015  | 
Institutional Venture Partners leads funding round along with existing investors Andreessen Horowitz, Citi Ventures, Felicis Ventures and Redpoint Ventures
With $7M in New Funding, Sqrrl Launches Linked Data Analysis Platform
Products and Releases  |  2/19/2015  | 
Sqrrl centers its focus on uniting cybersecurity incident detection and response
UVI Awarded Five-Year $1.3M U.S. DOE Cybersecurity Grant
Products and Releases  |  2/18/2015  | 
The Cybersecurity Workforce Pipeline will create a consortium composed of 13 Historically Black Colleges and Universities (HBCUs), two national labs, and a k-12 school district.
Snow Software fuels global success story with acquisition of Mobile Device Management technology developer
Products and Releases  |  2/18/2015  | 
The Institution and its ‘Revival’ MDM solution joins Snow family
ID Experts and Iatric Systems Offer Hospitals A Proactive Solution for Identifying and Managing Security Incidents
Products and Releases  |  2/18/2015  | 
Integrating Iatric Systems Security Audit Manager(TM) and ID Experts' RADAR® Identifies, Automates, and Simplifies the Complexities of Data Incident Response Management
OpenDNS Discovers New, Highly Sophisticated PayPal Phishing Campaign
Products and Releases  |  2/13/2015  | 
Phishing Websites Virtually Indistinguishable from Paypal’s Legitimate Properties
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-0658
Published: 2015-03-27
The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.