Products and Releases

Content posted in January 2015
IBM Research Announces Cloud Breakthrough For Protecting Personal Data
Products and Releases  |  1/28/2015  | 
Sophisticated cryptographic algorithm can prevent unwanted sharing of personal data, including credit card numbers
ZeroFOX Acquires Vulnr
Products and Releases  |  1/28/2015  | 
ZeroFOX accelerates growth through the acquisition of stealth-mode security company Vulnr
Proofpoint Releases Enterprise Protection Suite 8.0, Advances Email Security Leadership
Products and Releases  |  1/28/2015  | 
Enhancements include cloud-based email continuity, S/MIME encryption, SAML single sign-on and Sendmail MTA
Virtru Announces General Availability of its Encrypted Email and Digital Privacy Service
Products and Releases  |  1/28/2015  | 
Free End-to-End Email Encryption Available Forever; Advanced Control Features for Businesses Now Available in Virtru Pro
New Patent Eliminates Passwords
Products and Releases  |  1/28/2015  | 
Patented technology from TextPower verifies your identity while simplifying website logins; introduces SnapID that replaces usernames and passwords
Verizon Announces Security Enhancement for IoT Deployments
Products and Releases  |  1/28/2015  | 
Managed Certificate Services platform is designed to authenticate objects and machines and secure data transmitted between these connections
Ed Survey Results: Insider Threats
Products and Releases  |  1/28/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources
CYBERTECH SPONSORING DATA PRIVACY DAY 2015: SECURING THE INTERNET OF THINGS NATIONAL SEMINAR
Products and Releases  |  1/27/2015  | 
Invitation-only Event Will Take Think Tank Approach to Possible Solutions
15th Member of Washington, D.C.-Based Identity Theft Ring Pleads Guilty
Products and Releases  |  1/26/2015  | 
Defendant Admits To Targeting Parents Of Hospitalized Children, Among Others
Ad Networks Just Got More Secure
Products and Releases  |  1/26/2015  | 
New ad network puts users first, combines beautiful user experience with best in class privacy controls
SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity
Products and Releases  |  1/26/2015  | 
Careless and Untrained Insiders Identified as Top Source of Security Threats to Federal Agencies, but Concern and Investment Still Focused on Malicious External Threat Sources; SolarWinds Examines Policies, Processes and Threat Prevention Tools to Address Lack of Internal Visibility
New GHOST Vuln Affecting Linux
Products and Releases  |  1/26/2015  | 
High Severity Vulnerability Found in Linux GNU C Library Gives Attackers Control without System Credentials; Patches Available Today
Bitglass Breach Discovery Limits Damage From Data Breaches
Products and Releases  |  1/21/2015  | 
Automated Service Enables Enterprises to Discover Data Breaches Early
Adroit Digital Study Reveals Consumer Data Privacy and Security Concerns as President Obama Talks Cybersecurity in State of the Union
Products and Releases  |  1/21/2015  | 
70% believe the government isnt protecting their online privacy; a majority are most concerned about privacy and security on social media
Updated for 2015: Tools Designed to Manage Third Party Risk
Products and Releases  |  1/21/2015  | 
Shared Assessments Program Tools Empower Vendor Management Confidence
Vormetrics 2015 Insider Threat Report: 93% of U.S. Organizations Polled Vulnerable to Insider Threats
Products and Releases  |  1/21/2015  | 
Report Follows Record Year of Data Breaches; Reveals Spending Priorities, Security Risks
Online Trust Alliance Determines Over 90 Percent of Data Breaches in First Half of 2014 Could Have Been Easily Prevented
Products and Releases  |  1/21/2015  | 
Findings in newly released OTA Data Protection Best Practices and Risk Assessment Guides
ForgeRock and FireEye Join Forces to Detect Cyber Attacks with Identity-Aware Threat Intelligence Solution
Products and Releases  |  1/21/2015  | 
Integration of FireEye Threat Analytics Platform and the ForgeRock Identity Platform to Enable Organizations to Correlate Identity-Based Intrusions with Enterprise-wide Threat Indicators
RiskIQ Finds More Than 11 Percent of Android Banking and Finance- Related Apps are Suspicious
Products and Releases  |  1/21/2015  | 
Research of 350,000 Mobile Apps across 90 App Stores Reveals 40,000 Containing Malware or Suspicious Binaries
SQL Injection Vulnerabilities Surge
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Products and Releases  |  1/20/2015  | 
Waverley Labs and the Energy Production Infrastructure Center at UNC Charlotte Successfully Quantify Digital Risks for Power Grids
Distil Networks Acquires ScrapeSentry to Add 24/7 Security Ops Center
Products and Releases  |  1/13/2015  | 
New Managed Security Service Evaluates and Responds to Bot Threats in Real-Time Based on Each Customers Unique Security Policy and Response Plan
Websense Transformation Delivers New TRITON APX 8.0 Platform
Products and Releases  |  1/13/2015  | 
Websense Addresses Skills Gap with TRITON APX 8.0, the Result of 18 Months of Business Transformation & Innovation.
EyeLock's myris Is First and Only Iris Authenticator for New FIDO Open Industry Standard
Products and Releases  |  1/5/2015  | 
FIDO Ready(TM) certified device for universal strong authentication, myris provides consumers and enterprises with unprecedented security
Silent Circle Appoints Bill Conner CEO
Products and Releases  |  1/5/2015  | 
Former Entrust CEO, Nortel President Also Joins Board of Directors of Silent Circle, Blackphone


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.