Threat Intelligence

1/9/2018
01:55 PM
50%
50%

Threatcare Acquires Savage Security

The deal expands Threatcare's business beyond its breach and attack simulation platform to include services and applied research.

Vulnerability management platform provider Threatcare announced today it acquired its business partner Savage Security.

The deal, which closed in December, came months after the two companies formed a business partnership. Under the partnership, Threatcare's Violet breach and attack simulation platform was used with Savage's Blueprint and Breach Assessment services in which Savage's clients would simulate attacker actions.

Savage provides security consulting, as well as product testing for vendors and manufacturers. As part of the merger, Threatcare plans to pair Savage's services with its Violet platform, the company stated.

"Threatcare’s ability to now offer strategic services—in addition to software—enables us to be a one-stop solution for many security teams," Marcus Carey, Threatcare CEO, said in a statement. Terms of the deal were not disclosed.

Read more about the Savage Security acquisition here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ReinaldoFrench
50%
50%
ReinaldoFrench,
User Rank: Apprentice
1/10/2018 | 4:49:44 AM
dja;j;jn
nice
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11375
PUBLISHED: 2018-05-22
The _inst__lds() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
CVE-2018-11376
PUBLISHED: 2018-05-22
The r_read_le32() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file.
CVE-2018-11377
PUBLISHED: 2018-05-22
The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
CVE-2018-11378
PUBLISHED: 2018-05-22
The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file.
CVE-2018-11379
PUBLISHED: 2018-05-22
The get_debug_info() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted PE file.