Products and Releases

Content posted in January 2016
Authentic8 Expands Silo Integration with Corporate Network Infrastructure
Products and Releases  |  1/29/2016  | 
Secure virtual browser can now seamlessly authenticate with existing enterprise gateway proxies
ID Experts Raises $5 Million in Financing from BlueCross BlueShield Venture Partners and Sandbox Advantage Fund
Products and Releases  |  1/29/2016  | 
Strategic investment to expand monitoring for medical ID theft; ID Experts MyIDCare identity protection product being deployed at Blue Cross and Blue Shield companies
SafeBreach Arms Defenders with the Hackers Playbook
Products and Releases  |  1/29/2016  | 
Innovation in Breach Validation Identifies and Closes Attack Paths Before Exploitation; Company to be Featured in RSA Conference 2016 Innovation Sandbox
Fireglass Announces $20M in Series A Funding to Transform Cybersecurity
Products and Releases  |  1/29/2016  | 
Former Check Point Head of Security Products teams with military intelligence veteran, earning significant funding to introduce game-changing technology
UpGuard, Formerly ScriptRock, Unveils First FICO-Like Score for Cybersecurity and Compliance
Products and Releases  |  1/29/2016  | 
CSTAR Creates First Actionable Score for Businesses and Insurance Carriers to Accurately, Easily Measure Cyber Risk
Lockr: Hosted API & Encryption Key Management for Secure Website Content
Products and Releases  |  1/29/2016  | 
Lockr Managed Key Service for Drupal Is Out of Beta, Now Also Available for WordPress; First Key Free
ATTACKIQ EMERGES FROM STEALTH WITH CONTINUOUS TESTING PLATFORM
Products and Releases  |  1/29/2016  | 
FireDrill challenges existing on-premise network and cloud infrastructures to help organizations continuously, automatically, and affordably attack, measure and improve their defenses
iSheriff Introduces Complete Cloud-Based Security Solution
Products and Releases  |  1/27/2016  | 
iSheriff Complete Replaces Three Point Products Covering Web, Email and Endpoint Security
Attivo Strikes Back At KillDisk and CryptoLocker
Products and Releases  |  1/27/2016  | 
Provides Detection and Forensic Analysis for All Classes of Cyber Threats
Denise Anderson Named President of NH-ISAC
Products and Releases  |  1/27/2016  | 
Former FS-ISAC Executive to increase Healthcare ISAC growth and maturity
FireEye Announces Acquisition of Global Threat Intelligence Leader iSIGHT Partners
Products and Releases  |  1/20/2016  | 
Combination Creates Most Advanced and Comprehensive Cyber Threat Intelligence Operation, Driving Industry Toward Intelligence-Led Approach to Cybersecurity
SplashDatas fifth annual Worst Passwords List shows people continue putting themselves at risk
Products and Releases  |  1/19/2016  | 
While longer passwords debut on this years list of most commonly used passwords, they are not necessarily more secure
EiQ Networks Raises $9.55 Million in Series C Growth Capital Led by Arrowroot Capital
Products and Releases  |  1/19/2016  | 
New Financing to Accelerate Customer Acquisition for EiQs Hybrid SaaS Security Services
Raytheon|Websense Is Now Forcepoint
Products and Releases  |  1/19/2016  | 
FORCEPOINT BRINGS FRESH APPROACH TO SAFEGUARDING USERS, DATA AND NETWORKS FROM INSIDER AND OUTSIDER THREATS
New Advanced Cyber Degree Program Fills Critical Skills Education Gap
Products and Releases  |  1/19/2016  | 
First Advanced Cybersecurity Degree Program to Bridge Strategic & Tactical Implementation
Hyatt Completes Payment Card Incident Investigation
Products and Releases  |  1/15/2016  | 
Affected locations and respective at-risk dates are available at www.hyatt.com/protectingourcustomers
Virtru Launches Hardware-Backed Encryption Key Management Service
Products and Releases  |  1/13/2016  | 
Gives Users Ultimate Control Over Content and Keys
Ovum: Higher Ed must grow strategic role of IT
Products and Releases  |  1/13/2016  | 
Shape Security Secures $25M Series D for Intermational Growth
Products and Releases  |  1/13/2016  | 
Service now Protects Web and Mobile Apps of Many Fortune 100 Companies.
iSheriff Names John Mutch Chief Executive Officer
Products and Releases  |  1/13/2016  | 
Former CEO of BeyondTrust, Peregrine Systems & HNC Software Joins Cloud Security Leader
EiQ Networks Expands Value-Added Reseller Program with Addition of Redhawk Network Security
Products and Releases  |  1/13/2016  | 
Redhawk to Offer EiQs Hybrid SaaS SOCVue Security Monitoring and Vulnerability Management Services
RiskIQ Adds Who and Why Threat Intelligence from Intel 471 to PassiveTotal Security Analysis Platform
Products and Releases  |  1/13/2016  | 
Integration Allows Analysts to Link Adversary Profiles with their Attack Infrastructures to Preempt Threats
NTT positioned as a challenger in the Gartner Magic Quadrant for Managed Security Services, Worldwide
Products and Releases  |  1/13/2016  | 
Evaluation based on completeness of vision and ability to execute
Centrify Delivers Industrys First Federated Privileged Access Service to Protect Enterprises with Outsourced IT
Products and Releases  |  1/13/2016  | 
Cloud-based security solution minimizes an organizations attack surface by governing and securing federated access by outsourced IT, vendors and other third parties
Microsemi Introduces Security-Hardened NTP Timing and Synchronization Platform
Products and Releases  |  1/13/2016  | 
Versatile New SyncServer S600 and SyncServer S650 Enable Highly Secure, Accurate and Flexible Time and Frequency in Enterprise and Government Applications
Arxans 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality
Products and Releases  |  1/13/2016  | 
While 84 percent of consumers and IT execs believe their mobile health and finance apps are secure; 90 percent of mobile health and finance apps test positive for two critical security risks
Judge Sentences Defendant for Violation of the Computer Fraud and Abuse Act
Products and Releases  |  1/13/2016  | 
Insider at financial services company stole documents, deleted files on server to hide tracks.
DHS eyes new tech to combat rising DDoS attacks
Products and Releases  |  1/11/2016  | 
Galois Awarded $1.7 Million Contract To Enable Peer-to-peer Collaboration.
New Company, CyberVista, Launches to Tackle Cybersecurity Training for Business Leaders and Practitioners
Products and Releases  |  1/6/2016  | 
Education and Workforce Development Programs Will Help Organizations Protect Critical Digital Assets, Reduce Risk of Cyber Breach
HARMAN to Acquire Towersec Automotive Cyber Security
Products and Releases  |  1/5/2016  | 


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20735
PUBLISHED: 2019-01-17
** DISPUTED ** An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only...
CVE-2019-0624
PUBLISHED: 2019-01-17
A spoofing vulnerability exists when a Skype for Business 2015 server does not properly sanitize a specially crafted request, aka "Skype for Business 2015 Spoofing Vulnerability." This affects Skype.
CVE-2019-0646
PUBLISHED: 2019-01-17
A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka "Team Foundation Server Cross-site Scripting Vulnerability." This affects Team.
CVE-2019-0647
PUBLISHED: 2019-01-17
An information disclosure vulnerability exists when Team Foundation Server does not properly handle variables marked as secret, aka "Team Foundation Server Information Disclosure Vulnerability." This affects Team.
CVE-2018-20727
PUBLISHED: 2019-01-17
Multiple command injection vulnerabilities in NeDi before 1.7Cp3 allow authenticated users to execute code on the server side via the flt parameter to Nodes-Traffic.php, the dv parameter to Devices-Graph.php, or the tit parameter to drawmap.php.