Products and Releases

Content posted in October 2015
Page 1 / 2   >   >>
Exostar Receives Additional $10 Million Investment from Merck Global Health Innovation Fund
Products and Releases  |  10/30/2015  | 
Commitment Reflects Impact of Exostars Mission, Vision, and Solutions on Life Science and Healthcare Industries
Fantom Drives Announces DataShield Portable USB 3.0 External Hard Drives with 256-Bit AES Military Grade Encryption
Products and Releases  |  10/30/2015  | 
Secure, Keypad Access Drive Available in HDD or SSD Drive Types and Provides USB 3.0 Connectivity for up to 5Gbps Throughput Performance
CERTES NETWORKS PARTNERS WITH SOTI TO DELIVER END-TO-END SECURITY OF ENTERPRISE APPLICATIONS, CUT SHADOW IT RISK
Products and Releases  |  10/30/2015  | 
Alliance Combines Certes Software-Defined Security with SOTIs Enterprise Mobility Management Solutions for Faster, Safer Roll-out of Enterprise Applications
Cato Networks Secures $20 Million in Series A Round From Aspect Ventures and U.S. Venture Partners
Products and Releases  |  10/30/2015  | 
Theresia Gouw, Steve Krausz invest to make network security work for the distributed, mobile and Cloud-enabled enterprise
Skycure Report Finds Mobile Threats Lurking Around Every Corner, with Two in Every 100 Devices Already Compromised and More than 40 Percent at Medium to High Risk
Products and Releases  |  10/30/2015  | 
Risk of Attack Increases Every Month According to Mobile Threat Intelligence Report
Bit9 + Carbon Black Joins Facebooks ThreatExchange Community
Products and Releases  |  10/30/2015  | 
Companys customers will have immediate access to Facebooks robust threat-sharing community
Former RSA Executive Chairman Art Coviello Joins Bugcrowd Board of Directors
Products and Releases  |  10/30/2015  | 
Coviello Brings Over 20 Years of Security Domain Expertise
New Independent Study Finds Enterprise Security Experts Prefer Integrated, Cloud-Delivered Security Platforms
Products and Releases  |  10/30/2015  | 
Nearly All IT Security Decision Makers98%Recognize Integrated Cloud Security Platforms As Delivering Better Functionality Than Point Solutions
New remote management solutions from Thales deliver enhanced security and administration for cloud-based deployments
Products and Releases  |  10/30/2015  | 
Capabilities provide significant time and cost savings for nShield and payShield customers with multi-data center deployments
Online Trust Alliance and National Association of Realtors Create Smart Home Security and Privacy Checklist
Products and Releases  |  10/30/2015  | 
Guidance for home buyers, renters and real estate industry to help protect consumers during National Cybersecurity Awareness Month
Despite Breaches, Alarming Number of Companies Lack Security Controls for Accessing Enterprise Applications, According to Latest Research
Products and Releases  |  10/30/2015  | 
Independent Study Respondents Recognize Need for More Stringent Access Controls, Yet 60 Percent of Organizations Do Not Require Multifactor Authentication for Non-Employees Accessing Enterprise Applications
European IT Pros Survey: US Companies Dont Adequately Protect User Data from Government Surveillance
Products and Releases  |  10/30/2015  | 
VMworld Europe Attendees Predict that the U.K. will Continue to Suffer More Data Breaches than any other European Country in 2016
threatSMART from BrandProtect Empowers Enterprises to Better Connect, Analyze and Act On Threat Intelligence
Products and Releases  |  10/30/2015  | 
New Data Mining, Deep Incident Analysis and Correlation, and Multi-Language Support Capabilities Provide Greater Visibility Beyond the Traditional Security Perimeter
CounterTack | MCSI and Ponemon Institute Study Reveals That A Growing Number of U.S. Corporations Have Suffered a Nation-State Cyber Attack
Products and Releases  |  10/30/2015  | 
Thirty-five Percent of Organizations are Certain They Have Already Become Victim to a State-Sponsored Attack
Online Trust Alliance Releases New Internet of Things Trust Framework to Address Global Concerns
Products and Releases  |  10/29/2015  | 
Business and government leaders to attend upcoming summit to roll out IoT security, privacy and sustainability code of conduct
CyberX Reveals a New Zero-Day Vulnerability that Can Shut Down Operational Networks
Products and Releases  |  10/28/2015  | 
The vulnerability, FrostyURL, was discovered in a Rockwell Automation PLC and was validated by the ICS-CERT
Nexusguard Monthly Threat Report Reveals China is Top Target for DDoS Reflection Attacks
Products and Releases  |  10/28/2015  | 
NTP attacks continue to dominate the network threat landscape
Half of IT Security Pros Believe Theyre an Unlikely Target for Attack, Finds Ponemon Institute Study
Products and Releases  |  10/28/2015  | 
61 Percent of IT Security Pros Lack Confidence in Their Ability to Detect Advanced Threats
Wombat Security Announces Enhanced CyberStrength Assessment Solution to Assess Security Knowledge Across All Threat Areas
Products and Releases  |  10/28/2015  | 
New Solution Automates and Streamlines Process for Administrators to Assess Employee Knowledge on Key Security Concerns Covering All Threat Vectors
Vectra Networks Reveals Cyber Attackers Covert Encrypted Communications
Products and Releases  |  10/27/2015  | 
Revolutionary Advances in Data Science and Machine Learning Algorithms Are First in Industry to Reveal Threats without Decrypting Network Traffic
TrapX Integrates with Intel Securitys DXL Fabric
Products and Releases  |  10/27/2015  | 
DeceptionGrid Now Offers Expanded Offense for Dynamic Deception Operations
Arcanum Technology Intros N-Kod Authentication
Products and Releases  |  10/26/2015  | 
New technology delivers expanded character set, sophisticated encryption system and an innovative cypher algorithm to fortify passcodes.
Despite Breaches, Alarming Number of Companies Lack Security Controls for Accessing Enterprise Applications, According to Latest Research
Products and Releases  |  10/26/2015  | 
Independent Study Respondents Recognize Need for More Stringent Access Controls, Yet 60 Percent of Organizations Do Not Require Multifactor Authentication for Non-Employees Accessing Enterprise Applications
New Independent Study Finds Enterprise Security Experts Prefer Integrated, Cloud-Delivered Security Platforms
Products and Releases  |  10/26/2015  | 
Nearly All IT Security Decision Makers98%Recognize Integrated Cloud Security Platforms As Delivering Better Functionality Than Point Solutions
Simility Adds Trinity Ventures to Close $5.7 Million Round
Products and Releases  |  10/26/2015  | 
Fraud Detection Provider Has Prevented Thousands of Fraudulent Transactions Worldwide
SITELOCK PARTNERS WITH MEDIA TEMPLE TO OFFER COMPREHENSIVE HOSTING PACKAGES
Products and Releases  |  10/22/2015  | 
SiteLocksSecurity Solutions Now Offered with Web Hosts Managed Web Hosting Solutions
Judge Confirms Jury Finding of Willful Infringement of Veracode Patent
Products and Releases  |  10/22/2015  | 
Injunction prohibits Appthoritys continuing use of infringing technology
Bluefin To Provide USAePay Clients With PCI-Validated Point-to-Point Encryption Protection From Malware
Products and Releases  |  10/22/2015  | 
PCI Validated Decryptx P2PE Solution will enhance consumer data security for USAePay Clients
MicroStrategy Announces Usher 3.0 Enterprise Security Platform
Products and Releases  |  10/22/2015  | 
Major App Release Streamlines Design and Enhances Identity Badge Features
Distil Networks Releases New Data on The State of Digital Advertising Fraud
Products and Releases  |  10/22/2015  | 
Findings show large majority of publishers (75 percent) and advertisers (59 percent) are either unable, or unsure, about how to decipher human versus non-human traffic
Cytegic Secures $3 Million in Second Angel Financing Round
Products and Releases  |  10/21/2015  | 
Additional Funding Will Help Scale Customer Acquisition and North American Expansion
E8 Security Unveils Behavioral Intelligence Solution
Products and Releases  |  10/21/2015  | 
E8 Securitys Behavioral Intelligence Platform combines behavioral analytics with human insight to track and identify evolving threats, prioritize risk and speed up response times
Synack Pairs Dynamic Human Expertise with Innovative Vulnerability Intelligence Platform, Securing Perimeter Against Breaches
Products and Releases  |  10/21/2015  | 
Synack Launches Hydra - Integrated Directly with the Synack Red Team, Platform Provides Actionable, Continuous Exploitation Intelligence to the Enterprise
Trend Micro Acquires HP TippingPoint
Products and Releases  |  10/21/2015  | 
Combines next-generation IPS with industry-leading breach detection
ZixCorp Delivers Powerful New Solution with Global IT Leader
Products and Releases  |  10/20/2015  | 
New ZixGateway with Cisco Technology Introduces Option for Security Conscious Enterprise Customers
Wombat Security Announces the Acquisition of ThreatSim; Extends Leadership in Security Awareness and Training Market
Products and Releases  |  10/20/2015  | 
The combined organization provides security officers with the most comprehensive and effective security awareness and training solution, which provides actionable intelligence about employee knowledge and vulnerability to attack.
Lastline Debuts New Product to Protect Enterprise from Advanced Malware
Products and Releases  |  10/20/2015  | 
Lastline Detonator leverages existing deployments, such as Tripwire and Bit9 + Carbon Black, to make advanced malware protection as easy as flipping a switch.
LookingGlass Simplifies Threat Intel with Contribution to Open Source Community
Products and Releases  |  10/20/2015  | 
OpenTPX provides machine-readable threat intelligence, combining network security operations data with threat intelligence, analysis and scoring data in an optimized manner
New Security Solution Targets Third Party Vendors to Prevent Data Breaches
Products and Releases  |  10/20/2015  | 
Bay Dynamics Vendor Risk Assurance Solution Identifies, Analyzes and Remediates Risky Vendor Behaviors
Thales Acquires Vormetric
Products and Releases  |  10/20/2015  | 
Security Researchers Validate Major Problems with IoT
Products and Releases  |  10/20/2015  | 
IoT Village Demonstrates Rampant Security Vulnerabilities in Connected Devices
ISACA Study: Organizations Still Leaving Doors Open for Advanced Cyberattacks
Products and Releases  |  10/19/2015  | 
1 in 4 Have Experienced an APT
TrapX Announces the Release of DeceptionGrid Version 5
Products and Releases  |  10/19/2015  | 
Expanded Capability Reduces Time-to-Breach Detection
New Survey Reveals 1 in 5 Households Suffered Data Breach in Past Year
Products and Releases  |  10/16/2015  | 
ESET and National Cyber Security Alliance found 40 percent failed to properly secure their wireless routers.
Page 1 / 2   >   >>


New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.