Products and Releases

Content posted in November 2015
Products and Releases  |  11/30/2015  | 
CryptoFlow Solutions Automate Role-Based Access Control to Protect Enterprise Applications on Any Apple, Windows or Android Device
Bluebox Study Finds Security Flaws In 5 Popular Payment Apps
Products and Releases  |  11/24/2015  | 
Lack of Security Combined With Increased Mobile Use This Holiday Season Sets Stage for Mobile Breach.
Morgan Stanleys Former Cyber Emergency Response Chief Named IIDs Vice President of Threat Intelligence
Products and Releases  |  11/24/2015  | 
Sean Tierney to lead IIDs collaboration with businesses and government agencies to identify the latest malicious threats on the Internet
New Security Study: Consumers Fearful Of Mobile Shopping
Products and Releases  |  11/20/2015  | 
29 Percent of Consumers Do Not Know When Personal Information Has Been Accessed Without Consent, According to Study from Blancco Technology Group
Georgia Tech Joins M3AAWG to Fight Cybercrime
Products and Releases  |  11/20/2015  | 
Huntsman Security Introduces The First Automated Threat Verification To Dramatically Reduce Time-At-Risk
Products and Releases  |  11/20/2015  | 
Huntsman Automated Threat Verification re-engineers the Incident Management Process to slash Time-at-Risk
ThreatSTOP Unveils Enterprise-Grade Threat Protection Platform
Products and Releases  |  11/20/2015  | 
SaaS threat intelligence service meets demand for large-scale customer support
MACH37 Cyber Accelerator Accepting Applications for Spring 2016 Session
Products and Releases  |  11/20/2015  | 
Spring 16 Cohort to Begin on March 14th
CA Technologies Strengthens Identity-Centric Security Portfolio with Breach Prevention Capabilities Designed to Control Privileged User Access in VMware NSX Environments
Products and Releases  |  11/20/2015  | 
CA Security and Compliance Innovations Help Protect and Enable the Businesses and Systems that Power the Application Economy
FIDO Authentication Poised for Continued Growth as Alliance Submits FIDO 2.0 Web API to W3C
Products and Releases  |  11/20/2015  | 
FIDO Alliance, W3C Partner on Expanding Support for Web Platform
Cybric Closes $1.3 Million Investment to Virtualize and Automate Security
Products and Releases  |  11/20/2015  | 
Proven Security Practitioners from Bank of America, Netflix, Yahoo, Actifio and Dell Unite to Pioneer the Industrys Fastest Way to Find, Fix and Prevent Cyber Vulnerabilities
Avanan Exits Stealth with Cloud Security Offering
Products and Releases  |  11/19/2015  | 
Dunbar Introduces 360 Managed Security Service for Both Cyber and Physical Threats, Opens Advanced Security Operations Center
Products and Releases  |  11/17/2015  | 
Cybersecurity, Security Systems and Protective Services Business Lines Integrated Under New Dunbar Security Solutions Division
Ziften Unveils New Modular Extension Platform for On-Demand Detection and Response
Products and Releases  |  11/17/2015  | 
Ziften Open Visibility Evolves To Further Endpoint Controls
Webscale, Formerly Lagrange, Provides SSL Encryption for All Ecommerce Sites
Products and Releases  |  11/17/2015  | 
"Forced" SSL Within Cloud ADC Boosts E-tailers' Top and Bottom Line
vArmour Unveils Industry-Wide Pathway to a New Security Architecture for Multi-Clouds
Products and Releases  |  11/17/2015  | 
Multi-Cloud Security Architecture offers Framework to Help Organizations Plan and Adopt New Security Capabilities as they Embrace Multi-Clouds vArmour also announces new threat capabilities and commitment to open, flexible private cloud deployments with OpenStack KVM running on software-defined networking from Nuage Networks
Dell Adds Cylance Advanced Threat Protection Technology for Endpoint Security
Products and Releases  |  11/17/2015  | 
Dell to incorporate Cylance technology into its Dell Data Protection endpoint security solution New Dell Data Protection/Endpoint Security Suite Enterprise employs artificial intelligence for industry-leading advanced threat protection The new solution is 99 percent effective against threat vectors including malware, advanced persistent threats, targeted and zero-day attacks Dell continues its leadership in providing the most secure business PCs today with its Latitude and OptiPlex brands
Morphisec Debuts Moving Target Defense, Redefines Advanced Threat Protection
Products and Releases  |  11/17/2015  | 
Unique prevention & threat intelligence capabilities upend security economics in favor of defender
Practitioners Give Global Cybersecurity a C According to New Research from Tenable Network Security
Products and Releases  |  11/17/2015  | 
International survey of information security professionals identifies cloud, mobile devices and board-level involvement as common areas of weakness across seven key industry verticals
Cymmetria Adds $9 Million In Funding
Products and Releases  |  11/15/2015  | 
Gary Moore, Former Cisco President and Chief Operating Officer Appointed to vArmour Board of Directors
Products and Releases  |  11/12/2015  | 
Technology and Operational Luminary Joins Industry-Leading Data Center Security Company to Scale the Organization based on Global Customer Adoption of vArmours Distributed Security System
Veteran Computer Designers Develop Unique Cyber Security Solution
Products and Releases  |  11/12/2015  | 
Team Creates the World's First Software-Defined Secure Computer
Keeper Commander SDK Gives Developers More Control Over Password Security
Products and Releases  |  11/12/2015  | 
Toolkit Provides API / Command-Line Access for Password Rotation, Automation & More
Open Source Leader Marten Mickos Appointed CEO of HackerOne, Amid 400 Percent Year-Over-Year Customer Growth
Products and Releases  |  11/11/2015  | 
Top Cloud Exec Tapped to Grow World's Largest Marketplace of Hackers for Creating a More Secure Internet
Bluebox Security Introduces First Solution to Create Self-Defending Mobile Apps for Public App Stores
Products and Releases  |  11/11/2015  | 
New Survey Reveals 80% of Consumers Would Stop Being a Customer If a Company's Mobile App Was Breached
Blue Coat Delivers Industrys First Complete Cloud Security Solution with Acquisition of Cloud Security Innovator Elastica
Products and Releases  |  11/10/2015  | 
With the addition of Elastica, Blue Coat defines the security stack for the cloud generation: Integrates the Secure Web Gateway with Cloud Application Security Broker (CASB) to provide a secure path to the cloud for its more than 15,000 customers
Tenable Network Security Raises $250 Million in One of the Largest Funding Rounds for a Private Security Company
Products and Releases  |  11/10/2015  | 
Series B funding led by Insight Venture Partners and Accel will help accelerate development of the companys next-generation cyber security software
Trustwave and Bit9 + Carbon Black Form Managed Security Services Alliance
Products and Releases  |  11/10/2015  | 
Trustwave Launches New Managed Application Control Service Based on Bit9 Endpoint Security Technology, Welcomes Bit9 Managed Security Service Customers
CloudFlare Enables Universal DNSSEC for Its Millions of Customers for Free
Products and Releases  |  11/10/2015  | 
Already the worlds largest managed DNS provider, CloudFlare is now the Internets most secure
Dell Survey Shows Haphazard Privileged Account Management Practices Expose Businesses to Serious Risk
Products and Releases  |  11/9/2015  | 
76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach
Riverbed Survey Finds 89% of Federal Leaders are Worried About Data Security Across Remote Offices
Products and Releases  |  11/4/2015  | 
31% report a remote office security breach in the past year
vArmour Appoints Mark Weatherford as SVP, Chief Cybersecurity Strategist, and Dr. Matt Williamson As Chief Threat Defense Scientist
Products and Releases  |  11/3/2015  | 
Former Department of Homeland Security Deputy Under Secretary for Cybersecurity, and Leading Security Machine-Learning Scientist Join vArmour to Fuel Customer Growth and Extend Technology Leadership
EiQ Networks Intros Vulnerability Management Service for SME Market
Products and Releases  |  11/3/2015  | 
EiQ has Integrated Qualys Award-Winning Qualys Vulnerability Management into its SOCVue Service Offering to Assess, Analyze, and Remediate Vulnerabilities
Cisco Extends Security Everywhere with Broader Visibility, Control, and Protection for Shadow IT, Endpoints, and the Cloud
Products and Releases  |  11/3/2015  | 
Threat Awareness Service Gives Organizations the Upper Hand in Securing the Network
Deep Instinct Launches First Commercially Available, Real-Time Cybersecurity Solution Based on Deep Learning
Products and Releases  |  11/3/2015  | 
Instantly detects and prevents zero-day and APT attacks across all endpoints and mobile devices
Covertix Secures Email Communications with SmartCipherTM
Products and Releases  |  11/3/2015  | 
Technology protects messages & attachments with tracking, encryption, and role-based classification

Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-05-18
The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, the camera application triggers "user-memory-access" issue as the Camera CPP module Linux driver directly accesses the application provided buffer, which resides in u...
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing the HTT_T2H_MSG_TYPE_PEER_MAP or HTT_T2H_MSG_TYPE_PEER_UNMAP messages.
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, in __wlan_hdd_cfg80211_vendor_scan(), a buffer overwrite can potentially occur.
PUBLISHED: 2018-05-17
In Qualcomm Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in WLAN while processing an extscan hotlist event.