Products and Releases
Latest Content
Page 1 / 2   >   >>
Dell Unveils Dell Data Protection | Secure Lifecycle: Next-Generation Data Protection for the Entire Data Lifecycle
Products and Releases  |  12/2/2016  | 
Secures critical business documents and maintains protection as data moves across devices Provides IT with the authority to enact data leakage prevention, digital rights management and file access monitoring Expands visibility of where and how businesses access their data with granular policy controls capabilities
Cloud Security Alliance Launches Crowdfunded Cloud Security Management Tool
Products and Releases  |  12/2/2016  | 
The STARWatch SaaS application was designed to help organizations manage compliance and risks using CSA standards and best practices.
Infinite Group Inc. Introduces Nodeware Vulnerability Management Solution
Products and Releases  |  12/2/2016  | 
Nodewares plug-and-play system is intended to simplify and enhance security for SMBs.
Americans Fear Russian Hackers: Alertsec Survey
Products and Releases  |  12/1/2016  | 
Alertsecs 2016 Security Breach Study reveals that 2016 hacks changed security practices and that Americans worry about Russian hackers
FireEye Announces Helix the First Intelligence-led Platform to Simplify, Integrate, and Automate Security Operations
Products and Releases  |  11/29/2016  | 
Accelerates response with automation and orchestration powered by machine-learning and behavioral analysis based detection from FireEye MVX plus FireEye iSIGHT Intelligence Delivered via public or private cloud, or on premise, to integrate and prioritize every alert in customer environments within a simple user interface
BeyondTrust Adds File Integrity Monitoring for Unix and Linux Systems
Products and Releases  |  11/29/2016  | 
Least-privilege solution improves security by tamper-proofing critical binaries.
CloudPassage Launches New Release of Halo Agile Security Platform
Products and Releases  |  11/29/2016  | 
Improved Visibility and Filtering for Simplified Workload Security Management
TruSTAR Technology Secures Funding to Accelerate Company Growth and Connective Defense Vision
Products and Releases  |  11/17/2016  | 
Security Startup Obtains New Funding as Companies and Policymakers Signal Growing Need for Privacy-Preserving Cyber Incident Collaboration
Samsung SDS Selects Cyberbit For Industrial Control Security
Products and Releases  |  11/16/2016  | 
Samsung SDS will deliver Cyberbit's SCADAShield to protect its customers' industrial control networks.
Thomson Reuters, Pillsbury, FireEye Align For Cybersecurity Compliance Program
Products and Releases  |  11/14/2016  | 
Thomson Reuters, Pillsbury and FireEye have teamed up to help businesses meet new regulations and manage cybersecurity-related risk.
Thycotic Acquires Cyber Algorithms
Products and Releases  |  11/8/2016  | 
Thycotic has acquired the network security analytics company to identify malicious privileged behavior across systems and users.
FireEye Introduces Cloud MVX and MVX Smart Grid
Products and Releases  |  11/4/2016  | 
The most intelligent threat detection delivered via public, hybrid, or private cloud.
New Report Finds Majority of Activity on the Dark Web is Totally Legal and Mundane
Products and Releases  |  11/4/2016  | 
Terbium Labs Dispels Common Myths and Misconceptions with First Data-Driven Examination of the Dark Web
LightCyber Increases Precision of Behavioral Attack Detection
Products and Releases  |  11/4/2016  | 
New Release Uncovers Malicious Insider or Targeted Attacker Faster and with even Higher Accuracy
NetEnrich Survey: Companies Brace for New Cyber Attacks as Threats Multiply
Products and Releases  |  11/4/2016  | 
Stolen or weak passwords cause most attacks, but companies are also battling rogue employees, state-sponsored organizations, system failures and Advanced Persistent Threats
CounterTack Announces $10M Round of Funding
Products and Releases  |  11/4/2016  | 
Financing Round Closed to Accelerate Global Expansion in APAC and Federal Business.
Flexera Software Acquisition Tackles Open Source Software Security Risks
Products and Releases  |  11/4/2016  | 
Extends license compliance and security capabilities into the under-managed world of open source software components.
FireMon acquires FortyCloud for Multi-cloud Management Capabilities
Products and Releases  |  11/4/2016  | 
Innovation streak continues with new Intelligent Security Management solutions for the cloud.
Intel Security Outlines Strategy for Protecting New Digital Economy
Products and Releases  |  11/3/2016  | 
Intel Security Enhances Unified Defense Architecture to Safeguard Against Threats to Trust, Time and Money
Ubuntu Core 16 delivers foundation for secure IoT
Products and Releases  |  11/3/2016  | 
BioCatch Launches Next-Generation Behavioral Biometrics Platform for Enterprises
Products and Releases  |  11/3/2016  | 
BioCatchs 2.0 Release Delivers State-of-the-Art Fraud Prevention with Enhanced Accuracy, Faster Processing, and New Analytics Tools
DomainTools Launches New Cyber Threat Solution, PhishEye, to Stop Phishing Attacks Before They Occur
Products and Releases  |  11/3/2016  | 
New Cybersecurity Technology Leverages World's Largest DNS Database to Help Organizations Take Preventative Action Against Threats and Monitor "Phishy" Domain Names
Acalvio Technologies Secures Investment from GV
Products and Releases  |  11/3/2016  | 
GV (formerly Google Ventures) Joins Accel Ventures, Ignition Partners, Eileses Capital and Splunk, Bringing Total Investment in the Company to $22M
NSS Labs Tests Leading Web Browsers for Secure End User Experience
Products and Releases  |  11/1/2016  | 
Ransomware, socially engineered malware, and phishing increasingly used by attackers
Airbiquity, Harman Team Up On Intrusion Detection System For Connected Vehicles
Products and Releases  |  10/31/2016  | 
The two automotive technology companies joined forces to address connected vehicle cybersecurity concerns with an end-to-end solution.
Samsung Acquires Tachyon, Enterprise Mobile Device Configuration and Deployment Software
Products and Releases  |  10/27/2016  | 
Acquisition is intended to automate the setup process for Samsungs enterprise Android devices*, with the plan for faster, more secure and cost-effective, accurate and complete rollouts.
Tenable Network Security Acquires Container Security Firm FlawCheck
Products and Releases  |  10/26/2016  | 
Acquisition of San Francisco-based FlawCheck extends Tenable capabilities to provide comprehensive security for customers using Docker containers.
Common Enterprise IoT Devices Are Hackable In Under Three Minutes
Products and Releases  |  10/26/2016  | 
ForeScout analysis highlights the dangers posed by enterprise IoT devices, discovering that most can act as simple points of entry into critical enterprise networks.
Millennial Habits Threaten Federal IT Security
Products and Releases  |  10/25/2016  | 
As security-conscious baby boomers retire, a survey of the growing millennial workforce reveals a new generation more likely to trade caution for digital productivity.
75% Of Orgs Lack Skilled Cybersecurity Experts
Products and Releases  |  10/20/2016  | 
In a Tripwire study, 25% of respondents were confident their businesses have enough skilled cybersecurity experts to effectively detect and respond to serious breaches.
Voters Believe Cyberattacks More Threatening to U.S. Than ISIS
Products and Releases  |  10/19/2016  | 
Voters believe that both presidential candidates lack an adequate cyber security plan
Most Businesses Don't Inspect Cloud Services For Malware
Products and Releases  |  10/19/2016  | 
As cloud services usage, and risk, increases, businesses still lack visibility into data breaches.
Phantom Announces New Product, Partners, and Playbooks
Products and Releases  |  10/12/2016  | 
Community-Powered Approach to Drive Innovation and Growth
WhiteHat Security Partners with NowSecure For Mobile Application Security Testing Solution
Products and Releases  |  10/12/2016  | 
WhiteHat Sentinel Mobile Express features automated static and dynamic testing to quickly detect and verify mobile application vulnerabilities
FireMon Welcomes New President & CEO, Satin H. Mirchandani
Products and Releases  |  9/30/2016  | 
Security management vendor forges ahead with new CEO at the helm
ISAO Standards Organization To Release Initial Voluntary Guidelines For ISAOs
Products and Releases  |  9/30/2016  | 
ISAO documents in response to Executive Order 13691 available Friday, September 30 on ISAO.org
Trustwave Unveils Federated Global Security Operations
Products and Releases  |  9/29/2016  | 
Global Network of Federated, Advanced Security Operations Centers powered by Trustwave Ushers in the Next Generation of Cybersecurity Protection
Lenovo, Intel, Paypal And Synaptics Announce Collaboration To Bring Fido Authentication To Laptops
Products and Releases  |  9/22/2016  | 
ENOVO, INTEL, PAYPAL AND SYNAPTICS REVEAL COLLABORATION TO BRING A SIMPLE AND SAFE ONLINE AUTHENTICATION TO PCS WITH THE INDUSTRYS FIRST FIDO-ENABLED EMBEDDED FINGERPRINT SOLUTION.
White Ops Increases Market Momentum with $20 Million Series B
Products and Releases  |  9/19/2016  | 
Funding from Paladin Capital Group and Grotech Ventures Will Accelerate Innovation and Expand Sales and Marketing Footprint
Symantec Endpoint Protection Cloud Secures SMBs Against Growing Threats
Products and Releases  |  9/17/2016  | 
65 Percent of Targeted Attacks are Launched Against Small and Mid-sized Businesses to Steal Confidential Customer Information for Financial Gain.
Trusona Releases Cloud Identity Suite and Launches the #NoPasswords Revolution
Products and Releases  |  9/17/2016  | 
Trusona Essential is Free and Designed to Eliminate Passwords to Create a Safer Internet
Introducing A New Secure Memory Stick
Products and Releases  |  9/16/2016  | 
Centrifys Survey Finds Consumers More Concerned with Financial Data Getting Hacked than Private Information about Their Families Being Exposed
Products and Releases  |  9/16/2016  | 
Survey also reveals consumers more likely to hear about data breaches from the news or social medianot from companies holding their data.
Optiv Security Launches Technology-Enabled Third-Party Risk Managed Service
Products and Releases  |  9/16/2016  | 
Enables Companies to Better Manage Entire Vendor, Supplier and Business Associate Risk Management Lifecycles, Improving Compliance and Risk Management
IoT Village at DEF CON 24 Uncovers Extensive Security Flaws in Connected Devices
Products and Releases  |  9/16/2016  | 
Researchers Discover 47 New Security Vulnerabilities across 23 Devices and 21 Manufacturers; Executive Leadership from FTC and FCC Weigh in.
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.