Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in January 2016
Authentic8 Expands Silo Integration with Corporate Network Infrastructure
Products and Releases  |  1/29/2016  | 
Secure virtual browser can now seamlessly authenticate with existing enterprise gateway proxies
ID Experts Raises $5 Million in Financing from BlueCross BlueShield Venture Partners and Sandbox Advantage Fund
Products and Releases  |  1/29/2016  | 
Strategic investment to expand monitoring for medical ID theft; ID Experts MyIDCare identity protection product being deployed at Blue Cross and Blue Shield companies
SafeBreach Arms Defenders with the Hackers Playbook
Products and Releases  |  1/29/2016  | 
Innovation in Breach Validation Identifies and Closes Attack Paths Before Exploitation; Company to be Featured in RSA Conference 2016 Innovation Sandbox
Fireglass Announces $20M in Series A Funding to Transform Cybersecurity
Products and Releases  |  1/29/2016  | 
Former Check Point Head of Security Products teams with military intelligence veteran, earning significant funding to introduce game-changing technology
UpGuard, Formerly ScriptRock, Unveils First FICO-Like Score for Cybersecurity and Compliance
Products and Releases  |  1/29/2016  | 
CSTAR Creates First Actionable Score for Businesses and Insurance Carriers to Accurately, Easily Measure Cyber Risk
Lockr: Hosted API & Encryption Key Management for Secure Website Content
Products and Releases  |  1/29/2016  | 
Lockr Managed Key Service for Drupal Is Out of Beta, Now Also Available for WordPress; First Key Free
ATTACKIQ EMERGES FROM STEALTH WITH CONTINUOUS TESTING PLATFORM
Products and Releases  |  1/29/2016  | 
FireDrill challenges existing on-premise network and cloud infrastructures to help organizations continuously, automatically, and affordably attack, measure and improve their defenses
iSheriff Introduces Complete Cloud-Based Security Solution
Products and Releases  |  1/27/2016  | 
iSheriff Complete Replaces Three Point Products Covering Web, Email and Endpoint Security
Attivo Strikes Back At KillDisk and CryptoLocker
Products and Releases  |  1/27/2016  | 
Provides Detection and Forensic Analysis for All Classes of Cyber Threats
Denise Anderson Named President of NH-ISAC
Products and Releases  |  1/27/2016  | 
Former FS-ISAC Executive to increase Healthcare ISAC growth and maturity
FireEye Announces Acquisition of Global Threat Intelligence Leader iSIGHT Partners
Products and Releases  |  1/20/2016  | 
Combination Creates Most Advanced and Comprehensive Cyber Threat Intelligence Operation, Driving Industry Toward Intelligence-Led Approach to Cybersecurity
SplashDatas fifth annual Worst Passwords List shows people continue putting themselves at risk
Products and Releases  |  1/19/2016  | 
While longer passwords debut on this years list of most commonly used passwords, they are not necessarily more secure
EiQ Networks Raises $9.55 Million in Series C Growth Capital Led by Arrowroot Capital
Products and Releases  |  1/19/2016  | 
New Financing to Accelerate Customer Acquisition for EiQs Hybrid SaaS Security Services
Raytheon|Websense Is Now Forcepoint
Products and Releases  |  1/19/2016  | 
FORCEPOINT BRINGS FRESH APPROACH TO SAFEGUARDING USERS, DATA AND NETWORKS FROM INSIDER AND OUTSIDER THREATS
New Advanced Cyber Degree Program Fills Critical Skills Education Gap
Products and Releases  |  1/19/2016  | 
First Advanced Cybersecurity Degree Program to Bridge Strategic & Tactical Implementation
Hyatt Completes Payment Card Incident Investigation
Products and Releases  |  1/15/2016  | 
Affected locations and respective at-risk dates are available at www.hyatt.com/protectingourcustomers
Virtru Launches Hardware-Backed Encryption Key Management Service
Products and Releases  |  1/13/2016  | 
Gives Users Ultimate Control Over Content and Keys
Ovum: Higher Ed must grow strategic role of IT
Products and Releases  |  1/13/2016  | 
Shape Security Secures $25M Series D for Intermational Growth
Products and Releases  |  1/13/2016  | 
Service now Protects Web and Mobile Apps of Many Fortune 100 Companies.
iSheriff Names John Mutch Chief Executive Officer
Products and Releases  |  1/13/2016  | 
Former CEO of BeyondTrust, Peregrine Systems & HNC Software Joins Cloud Security Leader
EiQ Networks Expands Value-Added Reseller Program with Addition of Redhawk Network Security
Products and Releases  |  1/13/2016  | 
Redhawk to Offer EiQs Hybrid SaaS SOCVue Security Monitoring and Vulnerability Management Services
RiskIQ Adds Who and Why Threat Intelligence from Intel 471 to PassiveTotal Security Analysis Platform
Products and Releases  |  1/13/2016  | 
Integration Allows Analysts to Link Adversary Profiles with their Attack Infrastructures to Preempt Threats
NTT positioned as a challenger in the Gartner Magic Quadrant for Managed Security Services, Worldwide
Products and Releases  |  1/13/2016  | 
Evaluation based on completeness of vision and ability to execute
Centrify Delivers Industrys First Federated Privileged Access Service to Protect Enterprises with Outsourced IT
Products and Releases  |  1/13/2016  | 
Cloud-based security solution minimizes an organizations attack surface by governing and securing federated access by outsourced IT, vendors and other third parties
Microsemi Introduces Security-Hardened NTP Timing and Synchronization Platform
Products and Releases  |  1/13/2016  | 
Versatile New SyncServer S600 and SyncServer S650 Enable Highly Secure, Accurate and Flexible Time and Frequency in Enterprise and Government Applications
Arxans 5th Annual State of Application Security Report Reveals Disparity between Mobile App Security Perception and Reality
Products and Releases  |  1/13/2016  | 
While 84 percent of consumers and IT execs believe their mobile health and finance apps are secure; 90 percent of mobile health and finance apps test positive for two critical security risks
Judge Sentences Defendant for Violation of the Computer Fraud and Abuse Act
Products and Releases  |  1/13/2016  | 
Insider at financial services company stole documents, deleted files on server to hide tracks.
DHS eyes new tech to combat rising DDoS attacks
Products and Releases  |  1/11/2016  | 
Galois Awarded $1.7 Million Contract To Enable Peer-to-peer Collaboration.
New Company, CyberVista, Launches to Tackle Cybersecurity Training for Business Leaders and Practitioners
Products and Releases  |  1/6/2016  | 
Education and Workforce Development Programs Will Help Organizations Protect Critical Digital Assets, Reduce Risk of Cyber Breach
HARMAN to Acquire Towersec Automotive Cyber Security
Products and Releases  |  1/5/2016  | 


Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19794
PUBLISHED: 2019-12-13
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
CVE-2019-19795
PUBLISHED: 2019-12-13
samurai 0.7 has a heap-based buffer overflow in canonpath in util.c via a crafted build file.
CVE-2019-19796
PUBLISHED: 2019-12-13
Yabasic 2.86.2 has a heap-based buffer overflow in myformat in function.c via a crafted BASIC source file.
CVE-2019-5253
PUBLISHED: 2019-12-13
E5572-855 with versions earlier than 8.0.1.3(H335SP1C233) has an improper authentication vulnerability. The device does not perform a sufficient authentication when doing certain operations, successful exploit could allow an attacker to cause the device to reboot after launch a man in the middle att...
CVE-2019-5260
PUBLISHED: 2019-12-13
Huawei smartphones HUAWEI Y9 2019 and Honor View 20 have a denial of service vulnerability. Due to insufficient input validation of specific value when parsing the messages, an attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices to exploit this vul...