Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Latest Content
Page 1 / 2   >   >>
CrowdStrike Announces Automated Sensor Deployment for Falcon on Google Cloud
Products and Releases  |  2/25/2020  | 
CrowdStrike deepens partnership with Google Cloud to deliver customers automated endpoint security at scale and help meet compliance requirements across hybrid environments
ManageEngine Launches Privileged Session Management Solution
Products and Releases  |  2/24/2020  | 
Access Manager Plus allows security admins to facilitate and govern remote sessions.
BigID Unveils Next-Generation Data Security Capabilities
Products and Releases  |  2/24/2020  | 
Solution uses advanced data discovery and ML-driven cluster analysis to identify, classify, and process unstructured files.
Securonix Enables Use Case Testing at Full SOC Scale with New Analytics Sandbox Capability
Products and Releases  |  2/24/2020  | 
Securonix Unveils Capability to Improve SOC Efficiency and Make SIEM Tuning Better and Faster at Spark 2020 Conference and RSAC 2020
Fortanix Announces Availability of Self-Defending Key Management Service on VMware Cloud Marketplace
Products and Releases  |  2/24/2020  | 
Fortanix provides customers with unique data security solution that protects sensitive data in public, private, and hybrid cloud environments.
OneTrust Raises $210M in New Funding
Products and Releases  |  2/24/2020  | 
New round brings total investment to $410 million and valuation to $2.7 billion.
MITRE Engenuity to Evaluate Cybersecurity Products Based on Carbanak and FIN7 Groups
Products and Releases  |  2/20/2020  | 
Evaluations are intended to help vendors and end users better understand their products' capabilities in relation to MITRE's publicly accessible ATT&CK framework.
ZeroFOX Announces $74M in Funding from Intel Capital
Products and Releases  |  2/20/2020  | 
Funding to accelerate global expansion, product strategy, and extend leadership.
7 Out of 10 Organizations Have Seen Hacking Attempts via IoT
Products and Releases  |  2/20/2020  | 
New global survey from Extreme Networks reveals security precautions are falling flat and businesses underestimate the pervasiveness of insider threats.
BluBracket Unveils Code Security Suite, Announces $6.5M In Seed Funding
Products and Releases  |  2/19/2020  | 
Startup also selected as a finalist in the RSA Conference Innovation Sandbox Contest.
Egnyte Launches Next-Gen Content Services Platform for Businesses to Manage Risk and Accelerate Growth in the Content Critical Era
Products and Releases  |  2/19/2020  | 
Combines strong heritage in productivity and security innovation adopted by 16,000+ customers globally machine learning, analytics, and policy engine
Huntress Secures $18M Investment Led By ForgePoint Capital
Products and Releases  |  2/18/2020  | 
New funding will expand operations and allow for further research and development to address security challenges aimed at MSP and reseller channel.
Nok Nok Labs Welcomes Apple to the FIDO Alliance; Reports Record Growth
Products and Releases  |  2/18/2020  | 
Increasing industry support, global regulations, and customer adoption continue to drive deployments for strong passwordless authentication.
Spirent Expands CyberFlood Data Breach Assessment Solution
Products and Releases  |  2/14/2020  | 
Version 2.0 adds endpoint evaluation, evasion tactics, and support for MITRE ATT&CK.
A10 Networks Unveils Thunder Threat Protection System (TPS)
Products and Releases  |  2/13/2020  | 
Virtual DDoS defense solution protects 5G and cloud infrastructures.
Farsight Security to Debut Real-Time Security Data Innovations at RSA Conference
Products and Releases  |  2/12/2020  | 
Farsight Security to introduce the industrys first Newly Active Domains data feed together with SIE Batch, an easier way to consume real-time data via its Security Information Exchange platform
Offensive Security Enhances Flagship Penetration Testing with Kali Linux Training Course
Products and Releases  |  2/11/2020  | 
New, Expanded Curriculum Features Microsoft Active Directory and PowerShell Coverage; Virtual Pentest Lab Updated with Latest Targets and Machines
Nok Nok Labs Introduces Strong Authentication for IoT Devices -- Standalone and Connected to Cloud Services
Products and Releases  |  2/11/2020  | 
Multi-factor FIDO-based IoT solution for a connected world.
Netskope Attracts $340 Million in Additional Investment Led by Sequoia Capital Global Equities
Products and Releases  |  2/6/2020  | 
Fastest-growing SASE and cloud security company valued at nearly $3 billion, with unmatched global demand for its cloud-native network and data security platform
McAfee Research Reveals Election Website Security Shortcomings in 2020 Battleground States
Products and Releases  |  2/4/2020  | 
Lack of .GOV Validation and HTTPS Encryption Among County and County Election Websites Could Render 13 Battleground States Susceptible to Voter Disinformation Campaigns in 2020 Elections
Cowbell Cyber Demystifies Cyber Insurance with Cowbell Prime 100
Products and Releases  |  1/22/2020  | 
Cyber Insurance product backed by A-rated insurers delivers stand-alone, tailored coverage to SMBs in 5 minutes.
Tripwire Expands Industrial Security Capabilities, Launches Industrial Appliance Line, Joins ISA Global Security Alliance
Products and Releases  |  1/16/2020  | 
Tripwire introduces new line of hardware appliances and joins ISA Global Security Alliance to advance industrial cybersecurity.
California Fraudster Sentenced In Maryland To Four Years In Federal Prison For A Credit Card Fraud Scheme With Losses Of More Than $1.365 Million
Products and Releases  |  1/14/2020  | 
Used ATMs in Maryland, California, and Georgia to Withdraw Stolen Funds
Florida Man Sentenced in ATM 'Cash-out' Scheme
Products and Releases  |  1/14/2020  | 
Risk & Assurance Group Joins i3forum to Tackle Voice Fraud in International Telecommunications
Products and Releases  |  1/7/2020  | 
The not-for-profit industry bodies will join forces to boost collaboration and accelerate the fight against fraud for the entire carrier ecosystem,
Auctus Advises 5nine in Acronis Buyout
Products and Releases  |  1/6/2020  | 
Acronis will integrate 5nines technology into the Acronis Cyber Platform, making new services available through the Acronis Cyber Cloud Solutions portal.
Imperva Names Pam Murphy as CEO
Products and Releases  |  1/6/2020  | 
Former Infor and Oracle executive appointed to drive growth
Malware Variety Grew by 13.7% in 2019
Products and Releases  |  12/12/2019  | 
Growth driven by surge in web skimmers.
PCI Security Standards Council Publishes V3.0 of Point-To-Point Encryption (P2PE) Standard and Program
Products and Releases  |  12/12/2019  | 
Changes Driven by Stakeholder Feedback and Will Ultimately Result in More PCI P2PE Solutions Available to The Marketplace
Accidental Data Breaches Are on the Rise; Corporate Email Is a Leading Cause
Products and Releases  |  12/11/2019  | 
70% of security professionals admit to accidental internal breaches at their organization, but employee education is severely lacking as the CCPA compliance deadline looms.
Secure Code Warrior Raises US$47.6M
Products and Releases  |  12/10/2019  | 
Funding represents the largest ever US investment of its kind for an Australian-based cybersecurity business
Organizations Grapple With Growing Consumer Expectation for Personalization and Security Challenges
Products and Releases  |  12/10/2019  | 
Deloitte reveals eight qualities of a good digital identity management program.
Tenable Acquires Indegy
Products and Releases  |  12/6/2019  | 
Nuspire Hires Lewie Dunsworth As New CEO
Products and Releases  |  12/6/2019  | 
Saylor Frase, the managed security services provider's previous CEO, now serves as chairman of the board.
70 Top Hackers from Around the World Gathered in Finland for the 5G Cybersecurity Hackathon
Products and Releases  |  12/5/2019  | 
On November 29, top hackers from all over the world gathered to Oulu, Finland to test their skills against 5G and cybersecurity during the weekend. Oulu, located near the Arctic Circle, is known as a global 5G and 6G hotspot and is the home to research and development of top-tier cybersecurity.
Kaspersky finds ransomware now targeting back-up data
Products and Releases  |  12/5/2019  | 
New Genetec Research Shows Almost 4 in 10 Security Cameras Can Be at Risk of Cyberattack Due to Outdated Firmware
Products and Releases  |  12/5/2019  | 
Genetec primary data also shows that almost 1 in 4 organizations rely on default passwords for their security cameras.
LastPass Goes Passwordless
Products and Releases  |  12/4/2019  | 
LastPass Identity solution now provides passwordless login experience for business customers.
TrueFort Bolsters Management Team with 3 'Company Builder' Female Executives
Products and Releases  |  12/2/2019  | 
Application Detection & Response Start-Up Embraces Diversity to Position for Success.
TrueFort Unveils Application Detection and Response Platform to Secure Applications & Cloud Workloads
Products and Releases  |  12/2/2019  | 
Startup Founded by Wall Street IT Executives Goes Beyond Infrastructure with Unique Bring-Your-Own-Agent Model that Works with CrowdStrike and Others.
Tanium Announces Key Platform Enhancements to Help Customers Achieve Visibility, Management & Security Across Endpoints
Products and Releases  |  11/25/2019  | 
Unified endpoint management and security breaks down organizational silos and provides IT teams with unprecedented visibility and control of their environment.
Page 1 / 2   >   >>


Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18238
PUBLISHED: 2020-02-26
Moxa ioLogik 2542-HSPA Series Controllers and IOs, and IOxpress Configuration Utility ioLogik 2500 series firmware, Version 3.0 or lower IOxpress configuration utility, Version 2.3.0 or lower. Sensitive information is stored in configuration files without encryption, which may allow an attacker to a...
CVE-2019-17274
PUBLISHED: 2020-02-26
NetApp FAS 8300/8700 and AFF A400 Baseboard Management Controller (BMC) firmware versions 13.x prior to 13.1P1 were shipped with a default account enabled that could allow unauthorized arbitrary command execution via local access.
CVE-2019-17275
PUBLISHED: 2020-02-26
OnCommand Cloud Manager versions prior to 3.8.0 are susceptible to arbitrary code execution by remote attackers.
CVE-2020-3169
PUBLISHED: 2020-02-26
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root on an affected device. The vulnerability is due to insufficient validation of arguments passed to a spe...
CVE-2020-3170
PUBLISHED: 2020-02-26
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could expl...