Products and Releases

Content posted in January 2016
Authentic8 Expands Silo Integration with Corporate Network Infrastructure
Products and Releases  |  1/29/2016  | 
Secure virtual browser can now seamlessly authenticate with existing enterprise gateway proxies
ID Experts Raises $5 Million in Financing from BlueCross BlueShield Venture Partners and Sandbox Advantage Fund
Products and Releases  |  1/29/2016  | 
Strategic investment to expand monitoring for medical ID theft; ID Experts MyIDCare identity protection product being deployed at Blue Cross and Blue Shield companies
SafeBreach Arms Defenders with the Hackers Playbook
Products and Releases  |  1/29/2016  | 
Innovation in Breach Validation Identifies and Closes Attack Paths Before Exploitation; Company to be Featured in RSA Conference 2016 Innovation Sandbox
Fireglass Announces $20M in Series A Funding to Transform Cybersecurity
Products and Releases  |  1/29/2016  | 
Former Check Point Head of Security Products teams with military intelligence veteran, earning significant funding to introduce game-changing technology
UpGuard, Formerly ScriptRock, Unveils First FICO-Like Score for Cybersecurity and Compliance
Products and Releases  |  1/29/2016  | 
CSTAR Creates First Actionable Score for Businesses and Insurance Carriers to Accurately, Easily Measure Cyber Risk
Lockr: Hosted API & Encryption Key Management for Secure Website Content
Products and Releases  |  1/29/2016  | 
Lockr Managed Key Service for Drupal Is Out of Beta, Now Also Available for WordPress; First Key Free
ATTACKIQ EMERGES FROM STEALTH WITH CONTINUOUS TESTING PLATFORM
Products and Releases  |  1/29/2016  | 
FireDrill challenges existing on-premise network and cloud infrastructures to help organizations continuously, automatically, and affordably attack, measure and improve their defenses
iSheriff Introduces Complete Cloud-Based Security Solution
Products and Releases  |  1/27/2016  | 
iSheriff Complete Replaces Three Point Products Covering Web, Email and Endpoint Security
Attivo Strikes Back At KillDisk and CryptoLocker
Products and Releases  |  1/27/2016  | 
Provides Detection and Forensic Analysis for All Classes of Cyber Threats
Denise Anderson Named President of NH-ISAC
Products and Releases  |  1/27/2016  | 
Former FS-ISAC Executive to increase Healthcare ISAC growth and maturity
FireEye Announces Acquisition of Global Threat Intelligence Leader iSIGHT Partners
Products and Releases  |  1/20/2016  | 
Combination Creates Most Advanced and Comprehensive Cyber Threat Intelligence Operation, Driving Industry Toward Intelligence-Led Approach to Cybersecurity
SplashDatas fifth annual Worst Passwords List shows people continue putting themselves at risk
Products and Releases  |  1/19/2016  | 
While longer passwords debut on this years list of most commonly used passwords, they are not necessarily more secure
EiQ Networks Raises $9.55 Million in Series C Growth Capital Led by Arrowroot Capital
Products and Releases  |  1/19/2016  | 
New Financing to Accelerate Customer Acquisition for EiQs Hybrid SaaS Security Services
Raytheon|Websense Is Now Forcepoint
Products and Releases  |  1/19/2016  | 
FORCEPOINT BRINGS FRESH APPROACH TO SAFEGUARDING USERS, DATA AND NETWORKS FROM INSIDER AND OUTSIDER THREATS
New Advanced Cyber Degree Program Fills Critical Skills Education Gap
Products and Releases  |  1/19/2016  | 
First Advanced Cybersecurity Degree Program to Bridge Strategic & Tactical Implementation
Hyatt Completes Payment Card Incident Investigation
Products and Releases  |  1/15/2016  | 
Affected locations and respective at-risk dates are available at www.hyatt.com/protectingourcustomers
Virtru Launches Hardware-Backed Encryption Key Management Service
Products and Releases  |  1/13/2016  | 
Gives Users Ultimate Control Over Content and Keys
Ovum: Higher Ed must grow strategic role of IT
Products and Releases  |  1/13/2016  | 
Shape Security Secures $25M Series D for Intermational Growth
Products and Releases  |  1/13/2016  | 
Service now Protects Web and Mobile Apps of Many Fortune 100 Companies.
iSheriff Names John Mutch Chief Executive Officer
Products and Releases  |  1/13/2016  | 
Former CEO of BeyondTrust, Peregrine Systems & HNC Software Joins Cloud Security Leader
EiQ Networks Expands Value-Added Reseller Program with Addition of Redhawk Network Security
Products and Releases  |  1/13/2016  | 
Redhawk to Offer EiQs Hybrid SaaS SOCVue Security Monitoring and Vulnerability Management Services
RiskIQ Adds Who and Why Threat Intelligence from Intel 471 to PassiveTotal Security Analysis Platform
Products and Releases  |  1/13/2016  | 
Integration Allows Analysts to Link Adversary Profiles with their Attack Infrastructures to Preempt Threats
NTT positioned as a challenger in the Gartner Magic Quadrant for Managed Security Services, Worldwide
Products and Releases  |  1/13/2016  | 
Evaluation based on completeness of vision and ability to execute
Centrify Delivers Industrys First Federated Privileged Access Service to Protect Enterprises with Outsourced IT
Products and Releases  |  1/13/2016  | 
Cloud-based security solution minimizes an organizations attack surface by governing and securing federated access by outsourced IT, vendors and other third parties
Microsemi Introduces Security-Hardened NTP Timing and Synchronization Platform
Products and Releases  |  1/13/2016  | 
Versatile New SyncServer S600 and SyncServer S650 Enable Highly Secure, Accurate and Flexible Time and Frequency in Enterprise and Government Applications
Arxans 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality
Products and Releases  |  1/13/2016  | 
While 84 percent of consumers and IT execs believe their mobile health and finance apps are secure; 90 percent of mobile health and finance apps test positive for two critical security risks
Judge Sentences Defendant for Violation of the Computer Fraud and Abuse Act
Products and Releases  |  1/13/2016  | 
Insider at financial services company stole documents, deleted files on server to hide tracks.
DHS eyes new tech to combat rising DDoS attacks
Products and Releases  |  1/11/2016  | 
Galois Awarded $1.7 Million Contract To Enable Peer-to-peer Collaboration.
New Company, CyberVista, Launches to Tackle Cybersecurity Training for Business Leaders and Practitioners
Products and Releases  |  1/6/2016  | 
Education and Workforce Development Programs Will Help Organizations Protect Critical Digital Assets, Reduce Risk of Cyber Breach
HARMAN to Acquire Towersec Automotive Cyber Security
Products and Releases  |  1/5/2016  | 


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.