Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in October 2015
Page 1 / 2   >   >>
Exostar Receives Additional $10 Million Investment from Merck Global Health Innovation Fund
Products and Releases  |  10/30/2015  | 
Commitment Reflects Impact of Exostar’s Mission, Vision, and Solutions on Life Science and Healthcare Industries
Fantom Drives Announces DataShield Portable USB 3.0 External Hard Drives with 256-Bit AES Military Grade Encryption
Products and Releases  |  10/30/2015  | 
Secure, Keypad Access Drive Available in HDD or SSD Drive Types and Provides USB 3.0 Connectivity for up to 5Gbps Throughput Performance
CERTES NETWORKS PARTNERS WITH SOTI TO DELIVER END-TO-END SECURITY OF ENTERPRISE APPLICATIONS, CUT ‘SHADOW IT’ RISK
Products and Releases  |  10/30/2015  | 
Alliance Combines Certes’ Software-Defined Security with SOTI’s Enterprise Mobility Management Solutions for Faster, Safer Roll-out of Enterprise Applications
Cato Networks Secures $20 Million in Series A Round From Aspect Ventures and U.S. Venture Partners
Products and Releases  |  10/30/2015  | 
Theresia Gouw, Steve Krausz invest to make network security work for the distributed, mobile and Cloud-enabled enterprise
Skycure Report Finds Mobile Threats Lurking Around Every Corner, with Two in Every 100 Devices Already Compromised and More than 40 Percent at Medium to High Risk
Products and Releases  |  10/30/2015  | 
Risk of Attack Increases Every Month According to Mobile Threat Intelligence Report
Bit9 + Carbon Black Joins Facebook’s ThreatExchange Community
Products and Releases  |  10/30/2015  | 
Company’s customers will have immediate access to Facebook’s robust threat-sharing community
Former RSA Executive Chairman Art Coviello Joins Bugcrowd Board of Directors
Products and Releases  |  10/30/2015  | 
Coviello Brings Over 20 Years of Security Domain Expertise
New Independent Study Finds Enterprise Security Experts Prefer Integrated, Cloud-Delivered Security Platforms
Products and Releases  |  10/30/2015  | 
Nearly All IT Security Decision Makers—98%—Recognize Integrated Cloud Security Platforms As Delivering Better Functionality Than Point Solutions
New remote management solutions from Thales deliver enhanced security and administration for cloud-based deployments
Products and Releases  |  10/30/2015  | 
Capabilities provide significant time and cost savings for nShield and payShield customers with multi-data center deployments
Online Trust Alliance and National Association of Realtors Create Smart Home Security and Privacy Checklist
Products and Releases  |  10/30/2015  | 
Guidance for home buyers, renters and real estate industry to help protect consumers during National Cybersecurity Awareness Month
Despite Breaches, Alarming Number of Companies Lack Security Controls for Accessing Enterprise Applications, According to Latest Research
Products and Releases  |  10/30/2015  | 
Independent Study Respondents Recognize Need for More Stringent Access Controls, Yet 60 Percent of Organizations Do Not Require Multifactor Authentication for Non-Employees Accessing Enterprise Applications
European IT Pros Survey: US Companies Don’t Adequately Protect User Data from Government Surveillance
Products and Releases  |  10/30/2015  | 
VMworld Europe Attendees Predict that the U.K. will Continue to Suffer More Data Breaches than any other European Country in 2016
threatSMART™ from BrandProtect™ Empowers Enterprises to Better Connect, Analyze and Act On Threat Intelligence
Products and Releases  |  10/30/2015  | 
New Data Mining, Deep Incident Analysis and Correlation, and Multi-Language Support Capabilities Provide Greater Visibility Beyond the Traditional Security Perimeter
CounterTack | MCSI and Ponemon Institute Study Reveals That A Growing Number of U.S. Corporations Have Suffered a Nation-State Cyber Attack
Products and Releases  |  10/30/2015  | 
Thirty-five Percent of Organizations are Certain They Have Already Become Victim to a State-Sponsored Attack
Online Trust Alliance Releases New Internet of Things Trust Framework to Address Global Concerns
Products and Releases  |  10/29/2015  | 
Business and government leaders to attend upcoming summit to roll out IoT security, privacy and sustainability code of conduct
CyberX Reveals a New Zero-Day Vulnerability that Can Shut Down Operational Networks
Products and Releases  |  10/28/2015  | 
The vulnerability, FrostyURL, was discovered in a Rockwell Automation PLC and was validated by the ICS-CERT
Nexusguard Monthly Threat Report Reveals China is Top Target for DDoS Reflection Attacks
Products and Releases  |  10/28/2015  | 
NTP attacks continue to dominate the network threat landscape
Half of IT Security Pros Believe They’re an Unlikely Target for Attack, Finds Ponemon Institute Study
Products and Releases  |  10/28/2015  | 
61 Percent of IT Security Pros Lack Confidence in Their Ability to Detect Advanced Threats
Wombat Security Announces Enhanced CyberStrength Assessment Solution to Assess Security Knowledge Across All Threat Areas
Products and Releases  |  10/28/2015  | 
New Solution Automates and Streamlines Process for Administrators to Assess Employee Knowledge on Key Security Concerns Covering All Threat Vectors
Vectra Networks Reveals Cyber Attackers’ Covert Encrypted Communications
Products and Releases  |  10/27/2015  | 
Revolutionary Advances in Data Science and Machine Learning Algorithms Are First in Industry to Reveal Threats without Decrypting Network Traffic
TrapX Integrates with Intel Security’s DXL Fabric
Products and Releases  |  10/27/2015  | 
DeceptionGrid™ Now Offers Expanded Offense for Dynamic Deception Operations
Arcanum Technology Intros N-Kod Authentication
Products and Releases  |  10/26/2015  | 
New technology delivers expanded character set, sophisticated encryption system and an innovative cypher algorithm to fortify passcodes.
Despite Breaches, Alarming Number of Companies Lack Security Controls for Accessing Enterprise Applications, According to Latest Research
Products and Releases  |  10/26/2015  | 
Independent Study Respondents Recognize Need for More Stringent Access Controls, Yet 60 Percent of Organizations Do Not Require Multifactor Authentication for Non-Employees Accessing Enterprise Applications
New Independent Study Finds Enterprise Security Experts Prefer Integrated, Cloud-Delivered Security Platforms
Products and Releases  |  10/26/2015  | 
Nearly All IT Security Decision Makers—98%—Recognize Integrated Cloud Security Platforms As Delivering Better Functionality Than Point Solutions
Simility Adds Trinity Ventures to Close $5.7 Million Round
Products and Releases  |  10/26/2015  | 
Fraud Detection Provider Has Prevented Thousands of Fraudulent Transactions Worldwide
SITELOCK PARTNERS WITH MEDIA TEMPLE TO OFFER COMPREHENSIVE HOSTING PACKAGES
Products and Releases  |  10/22/2015  | 
SiteLock’sSecurity Solutions Now Offered with Web Host’s Managed Web Hosting Solutions
Judge Confirms Jury Finding of Willful Infringement of Veracode Patent
Products and Releases  |  10/22/2015  | 
Injunction prohibits Appthority’s continuing use of infringing technology
Bluefin To Provide USAePay Clients With PCI-Validated Point-to-Point Encryption Protection From Malware
Products and Releases  |  10/22/2015  | 
PCI Validated Decryptx™ P2PE Solution will enhance consumer data security for USAePay™ Clients
MicroStrategy Announces Usher™ 3.0 Enterprise Security Platform
Products and Releases  |  10/22/2015  | 
Major App Release Streamlines Design and Enhances Identity Badge Features
Distil Networks Releases New Data on The State of Digital Advertising Fraud
Products and Releases  |  10/22/2015  | 
Findings show large majority of publishers (75 percent) and advertisers (59 percent) are either unable, or unsure, about how to decipher human versus non-human traffic
Cytegic Secures $3 Million in Second Angel Financing Round
Products and Releases  |  10/21/2015  | 
Additional Funding Will Help Scale Customer Acquisition and North American Expansion
E8 Security Unveils Behavioral Intelligence Solution
Products and Releases  |  10/21/2015  | 
E8 Security’s Behavioral Intelligence Platform combines behavioral analytics with human insight to track and identify evolving threats, prioritize risk and speed up response times
Synack Pairs Dynamic Human Expertise with Innovative Vulnerability Intelligence Platform, Securing Perimeter Against Breaches
Products and Releases  |  10/21/2015  | 
Synack Launches Hydra - Integrated Directly with the Synack Red Team, Platform Provides Actionable, Continuous Exploitation Intelligence to the Enterprise
Trend Micro Acquires HP TippingPoint
Products and Releases  |  10/21/2015  | 
Combines next-generation IPS with industry-leading breach detection
ZixCorp Delivers Powerful New Solution with Global IT Leader
Products and Releases  |  10/20/2015  | 
New ZixGateway with Cisco Technology Introduces Option for Security Conscious Enterprise Customers
Wombat Security Announces the Acquisition of ThreatSim; Extends Leadership in Security Awareness and Training Market
Products and Releases  |  10/20/2015  | 
The combined organization provides security officers with the most comprehensive and effective security awareness and training solution, which provides actionable intelligence about employee knowledge and vulnerability to attack.
Lastline Debuts New Product to Protect Enterprise from Advanced Malware
Products and Releases  |  10/20/2015  | 
Lastline Detonator leverages existing deployments, such as Tripwire and Bit9 + Carbon Black, to make advanced malware protection as easy as “flipping a switch.”
LookingGlass Simplifies Threat Intel with Contribution to Open Source Community
Products and Releases  |  10/20/2015  | 
OpenTPX provides machine-readable threat intelligence, combining network security operations data with threat intelligence, analysis and scoring data in an optimized manner
New Security Solution Targets Third Party Vendors to Prevent Data Breaches
Products and Releases  |  10/20/2015  | 
Bay Dynamics® Vendor Risk Assurance™ Solution Identifies, Analyzes and Remediates Risky Vendor Behaviors
Thales Acquires Vormetric
Products and Releases  |  10/20/2015  | 
Security Researchers Validate Major Problems with IoT
Products and Releases  |  10/20/2015  | 
IoT Village Demonstrates Rampant Security Vulnerabilities in Connected Devices
ISACA Study: Organizations Still Leaving Doors Open for Advanced Cyberattacks
Products and Releases  |  10/19/2015  | 
1 in 4 Have Experienced an APT
TrapX Announces the Release of DeceptionGrid™ Version 5
Products and Releases  |  10/19/2015  | 
Expanded Capability Reduces Time-to-Breach Detection
New Survey Reveals 1 in 5 Households Suffered Data Breach in Past Year
Products and Releases  |  10/16/2015  | 
ESET and National Cyber Security Alliance found 40 percent failed to properly secure their wireless routers.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-33196
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
CVE-2023-33185
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
CVE-2023-33187
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
CVE-2023-33194
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
CVE-2023-2879
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file