Products and Releases

Content posted in January 2016
Authentic8 Expands Silo Integration with Corporate Network Infrastructure
Products and Releases  |  1/29/2016  | 
Secure virtual browser can now seamlessly authenticate with existing enterprise gateway proxies
ID Experts Raises $5 Million in Financing from BlueCross BlueShield Venture Partners and Sandbox Advantage Fund
Products and Releases  |  1/29/2016  | 
Strategic investment to expand monitoring for medical ID theft; ID Experts MyIDCare identity protection product being deployed at Blue Cross and Blue Shield companies
SafeBreach Arms Defenders with the Hackers Playbook
Products and Releases  |  1/29/2016  | 
Innovation in Breach Validation Identifies and Closes Attack Paths Before Exploitation; Company to be Featured in RSA Conference 2016 Innovation Sandbox
Fireglass Announces $20M in Series A Funding to Transform Cybersecurity
Products and Releases  |  1/29/2016  | 
Former Check Point Head of Security Products teams with military intelligence veteran, earning significant funding to introduce game-changing technology
UpGuard, Formerly ScriptRock, Unveils First FICO-Like Score for Cybersecurity and Compliance
Products and Releases  |  1/29/2016  | 
CSTAR Creates First Actionable Score for Businesses and Insurance Carriers to Accurately, Easily Measure Cyber Risk
Lockr: Hosted API & Encryption Key Management for Secure Website Content
Products and Releases  |  1/29/2016  | 
Lockr Managed Key Service for Drupal Is Out of Beta, Now Also Available for WordPress; First Key Free
ATTACKIQ EMERGES FROM STEALTH WITH CONTINUOUS TESTING PLATFORM
Products and Releases  |  1/29/2016  | 
FireDrill challenges existing on-premise network and cloud infrastructures to help organizations continuously, automatically, and affordably attack, measure and improve their defenses
iSheriff Introduces Complete Cloud-Based Security Solution
Products and Releases  |  1/27/2016  | 
iSheriff Complete Replaces Three Point Products Covering Web, Email and Endpoint Security
Attivo Strikes Back At KillDisk and CryptoLocker
Products and Releases  |  1/27/2016  | 
Provides Detection and Forensic Analysis for All Classes of Cyber Threats
Denise Anderson Named President of NH-ISAC
Products and Releases  |  1/27/2016  | 
Former FS-ISAC Executive to increase Healthcare ISAC growth and maturity
FireEye Announces Acquisition of Global Threat Intelligence Leader iSIGHT Partners
Products and Releases  |  1/20/2016  | 
Combination Creates Most Advanced and Comprehensive Cyber Threat Intelligence Operation, Driving Industry Toward Intelligence-Led Approach to Cybersecurity
SplashDatas fifth annual Worst Passwords List shows people continue putting themselves at risk
Products and Releases  |  1/19/2016  | 
While longer passwords debut on this years list of most commonly used passwords, they are not necessarily more secure
EiQ Networks Raises $9.55 Million in Series C Growth Capital Led by Arrowroot Capital
Products and Releases  |  1/19/2016  | 
New Financing to Accelerate Customer Acquisition for EiQs Hybrid SaaS Security Services
Raytheon|Websense Is Now Forcepoint
Products and Releases  |  1/19/2016  | 
FORCEPOINT BRINGS FRESH APPROACH TO SAFEGUARDING USERS, DATA AND NETWORKS FROM INSIDER AND OUTSIDER THREATS
New Advanced Cyber Degree Program Fills Critical Skills Education Gap
Products and Releases  |  1/19/2016  | 
First Advanced Cybersecurity Degree Program to Bridge Strategic & Tactical Implementation
Hyatt Completes Payment Card Incident Investigation
Products and Releases  |  1/15/2016  | 
Affected locations and respective at-risk dates are available at www.hyatt.com/protectingourcustomers
Virtru Launches Hardware-Backed Encryption Key Management Service
Products and Releases  |  1/13/2016  | 
Gives Users Ultimate Control Over Content and Keys
Ovum: Higher Ed must grow strategic role of IT
Products and Releases  |  1/13/2016  | 
Shape Security Secures $25M Series D for Intermational Growth
Products and Releases  |  1/13/2016  | 
Service now Protects Web and Mobile Apps of Many Fortune 100 Companies.
iSheriff Names John Mutch Chief Executive Officer
Products and Releases  |  1/13/2016  | 
Former CEO of BeyondTrust, Peregrine Systems & HNC Software Joins Cloud Security Leader
EiQ Networks Expands Value-Added Reseller Program with Addition of Redhawk Network Security
Products and Releases  |  1/13/2016  | 
Redhawk to Offer EiQs Hybrid SaaS SOCVue Security Monitoring and Vulnerability Management Services
RiskIQ Adds Who and Why Threat Intelligence from Intel 471 to PassiveTotal Security Analysis Platform
Products and Releases  |  1/13/2016  | 
Integration Allows Analysts to Link Adversary Profiles with their Attack Infrastructures to Preempt Threats
NTT positioned as a challenger in the Gartner Magic Quadrant for Managed Security Services, Worldwide
Products and Releases  |  1/13/2016  | 
Evaluation based on completeness of vision and ability to execute
Centrify Delivers Industrys First Federated Privileged Access Service to Protect Enterprises with Outsourced IT
Products and Releases  |  1/13/2016  | 
Cloud-based security solution minimizes an organizations attack surface by governing and securing federated access by outsourced IT, vendors and other third parties
Microsemi Introduces Security-Hardened NTP Timing and Synchronization Platform
Products and Releases  |  1/13/2016  | 
Versatile New SyncServer S600 and SyncServer S650 Enable Highly Secure, Accurate and Flexible Time and Frequency in Enterprise and Government Applications
Arxans 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality
Products and Releases  |  1/13/2016  | 
While 84 percent of consumers and IT execs believe their mobile health and finance apps are secure; 90 percent of mobile health and finance apps test positive for two critical security risks
Judge Sentences Defendant for Violation of the Computer Fraud and Abuse Act
Products and Releases  |  1/13/2016  | 
Insider at financial services company stole documents, deleted files on server to hide tracks.
DHS eyes new tech to combat rising DDoS attacks
Products and Releases  |  1/11/2016  | 
Galois Awarded $1.7 Million Contract To Enable Peer-to-peer Collaboration.
New Company, CyberVista, Launches to Tackle Cybersecurity Training for Business Leaders and Practitioners
Products and Releases  |  1/6/2016  | 
Education and Workforce Development Programs Will Help Organizations Protect Critical Digital Assets, Reduce Risk of Cyber Breach
HARMAN to Acquire Towersec Automotive Cyber Security
Products and Releases  |  1/5/2016  | 


12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.