Products and Releases

Content posted in November 2015
CERTES UNVEILS TOUCHLESS ENTERPRISE APPLICATION ACCESS CONTROL FOR SECURING ANY USER ON ANY ENDPOINT
Products and Releases  |  11/30/2015  | 
CryptoFlow Solutions Automate Role-Based Access Control to Protect Enterprise Applications on Any Apple, Windows or Android Device
Bluebox Study Finds Security Flaws In 5 Popular Payment Apps
Products and Releases  |  11/24/2015  | 
Lack of Security Combined With Increased Mobile Use This Holiday Season Sets Stage for Mobile Breach.
Morgan Stanleys Former Cyber Emergency Response Chief Named IIDs Vice President of Threat Intelligence
Products and Releases  |  11/24/2015  | 
Sean Tierney to lead IIDs collaboration with businesses and government agencies to identify the latest malicious threats on the Internet
New Security Study: Consumers Fearful Of Mobile Shopping
Products and Releases  |  11/20/2015  | 
29 Percent of Consumers Do Not Know When Personal Information Has Been Accessed Without Consent, According to Study from Blancco Technology Group
Georgia Tech Joins M3AAWG to Fight Cybercrime
Products and Releases  |  11/20/2015  | 
Huntsman Security Introduces The First Automated Threat Verification To Dramatically Reduce Time-At-Risk
Products and Releases  |  11/20/2015  | 
Huntsman Automated Threat Verification re-engineers the Incident Management Process to slash Time-at-Risk
ThreatSTOP Unveils Enterprise-Grade Threat Protection Platform
Products and Releases  |  11/20/2015  | 
SaaS threat intelligence service meets demand for large-scale customer support
MACH37 Cyber Accelerator Accepting Applications for Spring 2016 Session
Products and Releases  |  11/20/2015  | 
Spring 16 Cohort to Begin on March 14th
CA Technologies Strengthens Identity-Centric Security Portfolio with Breach Prevention Capabilities Designed to Control Privileged User Access in VMware NSX Environments
Products and Releases  |  11/20/2015  | 
CA Security and Compliance Innovations Help Protect and Enable the Businesses and Systems that Power the Application Economy
FIDO Authentication Poised for Continued Growth as Alliance Submits FIDO 2.0 Web API to W3C
Products and Releases  |  11/20/2015  | 
FIDO Alliance, W3C Partner on Expanding Support for Web Platform
Cybric Closes $1.3 Million Investment to Virtualize and Automate Security
Products and Releases  |  11/20/2015  | 
Proven Security Practitioners from Bank of America, Netflix, Yahoo, Actifio and Dell Unite to Pioneer the Industrys Fastest Way to Find, Fix and Prevent Cyber Vulnerabilities
Avanan Exits Stealth with Cloud Security Offering
Products and Releases  |  11/19/2015  | 
Dunbar Introduces 360 Managed Security Service for Both Cyber and Physical Threats, Opens Advanced Security Operations Center
Products and Releases  |  11/17/2015  | 
Cybersecurity, Security Systems and Protective Services Business Lines Integrated Under New Dunbar Security Solutions Division
Ziften Unveils New Modular Extension Platform for On-Demand Detection and Response
Products and Releases  |  11/17/2015  | 
Ziften Open Visibility Evolves To Further Endpoint Controls
Webscale, Formerly Lagrange, Provides SSL Encryption for All Ecommerce Sites
Products and Releases  |  11/17/2015  | 
"Forced" SSL Within Cloud ADC Boosts E-tailers' Top and Bottom Line
vArmour Unveils Industry-Wide Pathway to a New Security Architecture for Multi-Clouds
Products and Releases  |  11/17/2015  | 
Multi-Cloud Security Architecture offers Framework to Help Organizations Plan and Adopt New Security Capabilities as they Embrace Multi-Clouds vArmour also announces new threat capabilities and commitment to open, flexible private cloud deployments with OpenStack KVM running on software-defined networking from Nuage Networks
Dell Adds Cylance Advanced Threat Protection Technology for Endpoint Security
Products and Releases  |  11/17/2015  | 
Dell to incorporate Cylance technology into its Dell Data Protection endpoint security solution New Dell Data Protection/Endpoint Security Suite Enterprise employs artificial intelligence for industry-leading advanced threat protection The new solution is 99 percent effective against threat vectors including malware, advanced persistent threats, targeted and zero-day attacks Dell continues its leadership in providing the most secure business PCs today with its Latitude and OptiPlex brands
Morphisec Debuts Moving Target Defense, Redefines Advanced Threat Protection
Products and Releases  |  11/17/2015  | 
Unique prevention & threat intelligence capabilities upend security economics in favor of defender
Practitioners Give Global Cybersecurity a C According to New Research from Tenable Network Security
Products and Releases  |  11/17/2015  | 
International survey of information security professionals identifies cloud, mobile devices and board-level involvement as common areas of weakness across seven key industry verticals
Cymmetria Adds $9 Million In Funding
Products and Releases  |  11/15/2015  | 
Gary Moore, Former Cisco President and Chief Operating Officer Appointed to vArmour Board of Directors
Products and Releases  |  11/12/2015  | 
Technology and Operational Luminary Joins Industry-Leading Data Center Security Company to Scale the Organization based on Global Customer Adoption of vArmours Distributed Security System
Veteran Computer Designers Develop Unique Cyber Security Solution
Products and Releases  |  11/12/2015  | 
Team Creates the World's First Software-Defined Secure Computer
Keeper Commander SDK Gives Developers More Control Over Password Security
Products and Releases  |  11/12/2015  | 
Toolkit Provides API / Command-Line Access for Password Rotation, Automation & More
Open Source Leader Marten Mickos Appointed CEO of HackerOne, Amid 400 Percent Year-Over-Year Customer Growth
Products and Releases  |  11/11/2015  | 
Top Cloud Exec Tapped to Grow World's Largest Marketplace of Hackers for Creating a More Secure Internet
Bluebox Security Introduces First Solution to Create Self-Defending Mobile Apps for Public App Stores
Products and Releases  |  11/11/2015  | 
New Survey Reveals 80% of Consumers Would Stop Being a Customer If a Company's Mobile App Was Breached
Blue Coat Delivers Industrys First Complete Cloud Security Solution with Acquisition of Cloud Security Innovator Elastica
Products and Releases  |  11/10/2015  | 
With the addition of Elastica, Blue Coat defines the security stack for the cloud generation: Integrates the Secure Web Gateway with Cloud Application Security Broker (CASB) to provide a secure path to the cloud for its more than 15,000 customers
Tenable Network Security Raises $250 Million in One of the Largest Funding Rounds for a Private Security Company
Products and Releases  |  11/10/2015  | 
Series B funding led by Insight Venture Partners and Accel will help accelerate development of the companys next-generation cyber security software
Trustwave and Bit9 + Carbon Black Form Managed Security Services Alliance
Products and Releases  |  11/10/2015  | 
Trustwave Launches New Managed Application Control Service Based on Bit9 Endpoint Security Technology, Welcomes Bit9 Managed Security Service Customers
CloudFlare Enables Universal DNSSEC for Its Millions of Customers for Free
Products and Releases  |  11/10/2015  | 
Already the worlds largest managed DNS provider, CloudFlare is now the Internets most secure
Dell Survey Shows Haphazard Privileged Account Management Practices Expose Businesses to Serious Risk
Products and Releases  |  11/9/2015  | 
76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach
Riverbed Survey Finds 89% of Federal Leaders are Worried About Data Security Across Remote Offices
Products and Releases  |  11/4/2015  | 
31% report a remote office security breach in the past year
vArmour Appoints Mark Weatherford as SVP, Chief Cybersecurity Strategist, and Dr. Matt Williamson As Chief Threat Defense Scientist
Products and Releases  |  11/3/2015  | 
Former Department of Homeland Security Deputy Under Secretary for Cybersecurity, and Leading Security Machine-Learning Scientist Join vArmour to Fuel Customer Growth and Extend Technology Leadership
EiQ Networks Intros Vulnerability Management Service for SME Market
Products and Releases  |  11/3/2015  | 
EiQ has Integrated Qualys Award-Winning Qualys Vulnerability Management into its SOCVue Service Offering to Assess, Analyze, and Remediate Vulnerabilities
Cisco Extends Security Everywhere with Broader Visibility, Control, and Protection for Shadow IT, Endpoints, and the Cloud
Products and Releases  |  11/3/2015  | 
Threat Awareness Service Gives Organizations the Upper Hand in Securing the Network
Deep Instinct Launches First Commercially Available, Real-Time Cybersecurity Solution Based on Deep Learning
Products and Releases  |  11/3/2015  | 
Instantly detects and prevents zero-day and APT attacks across all endpoints and mobile devices
Covertix Secures Email Communications with SmartCipherTM
Products and Releases  |  11/3/2015  | 
Technology protects messages & attachments with tracking, encryption, and role-based classification


12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.