Attacks/Breaches

6/21/2018
04:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trillium Opens Michigan Cybersecurity Operations and R&D Center

Trillium Secure announced the establishment of an operations and R&D center in Ann Arbor, Michigan.

Ann Arbor, June 21, 2018  -- Trillium Secure, Inc. today announced the establishment of its’ Midwest Operations and R&D Center in Ann Arbor, Michigan.

“Trillium is exactly the kind of high-tech company we want here,” said Phil Santer, Senior Vice President for Ann Arbor SPARK, one of the area’s premier economic development organizations. Ann Arbor SPARK helped the company establish itself in downtown Ann Arbor.

“Customer demand for our products and services is fueling this expansion to Southeast Michigan,” said David Uze, Trillium President and CEO. “The Michigan R&D center enables us to support our growing list of automotive and fleet customers in the region. We provide commercial and government clients with lifecycle cybersecurity protection for their vehicles, fleets and vehicular data.”

The new Operations and R&D center is led by John Davis, a University of Michigan graduate and native Michigander. “Ann Arbor gives us close proximity to connected and autonomous vehicle testing sites and university research programs,” said Davis. “I’m thrilled to join the Trillium team.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19301
PUBLISHED: 2018-11-15
tp4a TELEPORT 3.1.0 allows XSS via the login page because a crafted username is mishandled when an administrator later views the system log.
CVE-2018-5407
PUBLISHED: 2018-11-15
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-14934
PUBLISHED: 2018-11-15
The Bluetooth subsystem on Polycom Trio devices with software before 5.5.4 has Incorrect Access Control. An attacker can connect without authentication and subsequently record audio from the device microphone.
CVE-2018-14935
PUBLISHED: 2018-11-15
The Web administration console on Polycom Trio devices with software before 5.5.4 has XSS.
CVE-2018-16619
PUBLISHED: 2018-11-15
Sonatype Nexus Repository Manager before 3.14 allows XSS.