Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in November 2015
Products and Releases  |  11/30/2015  | 
CryptoFlow Solutions Automate Role-Based Access Control to Protect Enterprise Applications on Any Apple, Windows or Android Device
Bluebox Study Finds Security Flaws In 5 Popular Payment Apps
Products and Releases  |  11/24/2015  | 
Lack of Security Combined With Increased Mobile Use This Holiday Season Sets Stage for Mobile Breach.
Morgan Stanleys Former Cyber Emergency Response Chief Named IIDs Vice President of Threat Intelligence
Products and Releases  |  11/24/2015  | 
Sean Tierney to lead IIDs collaboration with businesses and government agencies to identify the latest malicious threats on the Internet
New Security Study: Consumers Fearful Of Mobile Shopping
Products and Releases  |  11/20/2015  | 
29 Percent of Consumers Do Not Know When Personal Information Has Been Accessed Without Consent, According to Study from Blancco Technology Group
Georgia Tech Joins M3AAWG to Fight Cybercrime
Products and Releases  |  11/20/2015  | 
Huntsman Security Introduces The First Automated Threat Verification To Dramatically Reduce Time-At-Risk
Products and Releases  |  11/20/2015  | 
Huntsman Automated Threat Verification re-engineers the Incident Management Process to slash Time-at-Risk
ThreatSTOP Unveils Enterprise-Grade Threat Protection Platform
Products and Releases  |  11/20/2015  | 
SaaS threat intelligence service meets demand for large-scale customer support
MACH37 Cyber Accelerator Accepting Applications for Spring 2016 Session
Products and Releases  |  11/20/2015  | 
Spring 16 Cohort to Begin on March 14th
CA Technologies Strengthens Identity-Centric Security Portfolio with Breach Prevention Capabilities Designed to Control Privileged User Access in VMware NSX Environments
Products and Releases  |  11/20/2015  | 
CA Security and Compliance Innovations Help Protect and Enable the Businesses and Systems that Power the Application Economy
FIDO Authentication Poised for Continued Growth as Alliance Submits FIDO 2.0 Web API to W3C
Products and Releases  |  11/20/2015  | 
FIDO Alliance, W3C Partner on Expanding Support for Web Platform
Cybric Closes $1.3 Million Investment to Virtualize and Automate Security
Products and Releases  |  11/20/2015  | 
Proven Security Practitioners from Bank of America, Netflix, Yahoo, Actifio and Dell Unite to Pioneer the Industrys Fastest Way to Find, Fix and Prevent Cyber Vulnerabilities
Avanan Exits Stealth with Cloud Security Offering
Products and Releases  |  11/19/2015  | 
Dunbar Introduces 360 Managed Security Service for Both Cyber and Physical Threats, Opens Advanced Security Operations Center
Products and Releases  |  11/17/2015  | 
Cybersecurity, Security Systems and Protective Services Business Lines Integrated Under New Dunbar Security Solutions Division
Ziften Unveils New Modular Extension Platform for On-Demand Detection and Response
Products and Releases  |  11/17/2015  | 
Ziften Open Visibility Evolves To Further Endpoint Controls
Webscale, Formerly Lagrange, Provides SSL Encryption for All Ecommerce Sites
Products and Releases  |  11/17/2015  | 
"Forced" SSL Within Cloud ADC Boosts E-tailers' Top and Bottom Line
vArmour Unveils Industry-Wide Pathway to a New Security Architecture for Multi-Clouds
Products and Releases  |  11/17/2015  | 
Multi-Cloud Security Architecture offers Framework to Help Organizations Plan and Adopt New Security Capabilities as they Embrace Multi-Clouds vArmour also announces new threat capabilities and commitment to open, flexible private cloud deployments with OpenStack KVM running on software-defined networking from Nuage Networks
Dell Adds Cylance Advanced Threat Protection Technology for Endpoint Security
Products and Releases  |  11/17/2015  | 
Dell to incorporate Cylance technology into its Dell Data Protection endpoint security solution New Dell Data Protection/Endpoint Security Suite Enterprise employs artificial intelligence for industry-leading advanced threat protection The new solution is 99 percent effective against threat vectors including malware, advanced persistent threats, targeted and zero-day attacks Dell continues its leadership in providing the most secure business PCs today with its Latitude and OptiPlex brands
Morphisec Debuts Moving Target Defense, Redefines Advanced Threat Protection
Products and Releases  |  11/17/2015  | 
Unique prevention & threat intelligence capabilities upend security economics in favor of defender
Practitioners Give Global Cybersecurity a C According to New Research from Tenable Network Security
Products and Releases  |  11/17/2015  | 
International survey of information security professionals identifies cloud, mobile devices and board-level involvement as common areas of weakness across seven key industry verticals
Cymmetria Adds $9 Million In Funding
Products and Releases  |  11/15/2015  | 
Gary Moore, Former Cisco President and Chief Operating Officer Appointed to vArmour Board of Directors
Products and Releases  |  11/12/2015  | 
Technology and Operational Luminary Joins Industry-Leading Data Center Security Company to Scale the Organization based on Global Customer Adoption of vArmours Distributed Security System
Veteran Computer Designers Develop Unique Cyber Security Solution
Products and Releases  |  11/12/2015  | 
Team Creates the World's First Software-Defined Secure Computer
Keeper Commander SDK Gives Developers More Control Over Password Security
Products and Releases  |  11/12/2015  | 
Toolkit Provides API / Command-Line Access for Password Rotation, Automation & More
Open Source Leader Marten Mickos Appointed CEO of HackerOne, Amid 400 Percent Year-Over-Year Customer Growth
Products and Releases  |  11/11/2015  | 
Top Cloud Exec Tapped to Grow World's Largest Marketplace of Hackers for Creating a More Secure Internet
Bluebox Security Introduces First Solution to Create Self-Defending Mobile Apps for Public App Stores
Products and Releases  |  11/11/2015  | 
New Survey Reveals 80% of Consumers Would Stop Being a Customer If a Company's Mobile App Was Breached
Tenable Network Security Raises $250 Million in One of the Largest Funding Rounds for a Private Security Company
Products and Releases  |  11/10/2015  | 
Series B funding led by Insight Venture Partners and Accel will help accelerate development of the companys next-generation cyber security software
Blue Coat Delivers Industrys First Complete Cloud Security Solution with Acquisition of Cloud Security Innovator Elastica
Products and Releases  |  11/10/2015  | 
With the addition of Elastica, Blue Coat defines the security stack for the cloud generation: Integrates the Secure Web Gateway with Cloud Application Security Broker (CASB) to provide a secure path to the cloud for its more than 15,000 customers
Trustwave and Bit9 + Carbon Black Form Managed Security Services Alliance
Products and Releases  |  11/10/2015  | 
Trustwave Launches New Managed Application Control Service Based on Bit9 Endpoint Security Technology, Welcomes Bit9 Managed Security Service Customers
CloudFlare Enables Universal DNSSEC for Its Millions of Customers for Free
Products and Releases  |  11/10/2015  | 
Already the worlds largest managed DNS provider, CloudFlare is now the Internets most secure
Dell Survey Shows Haphazard Privileged Account Management Practices Expose Businesses to Serious Risk
Products and Releases  |  11/9/2015  | 
76 percent of global survey respondents believe better control of privileged accounts would reduce the likelihood of a security breach
Riverbed Survey Finds 89% of Federal Leaders are Worried About Data Security Across Remote Offices
Products and Releases  |  11/4/2015  | 
31% report a remote office security breach in the past year
vArmour Appoints Mark Weatherford as SVP, Chief Cybersecurity Strategist, and Dr. Matt Williamson As Chief Threat Defense Scientist
Products and Releases  |  11/3/2015  | 
Former Department of Homeland Security Deputy Under Secretary for Cybersecurity, and Leading Security Machine-Learning Scientist Join vArmour to Fuel Customer Growth and Extend Technology Leadership
EiQ Networks Intros Vulnerability Management Service for SME Market
Products and Releases  |  11/3/2015  | 
EiQ has Integrated Qualys Award-Winning Qualys Vulnerability Management into its SOCVue Service Offering to Assess, Analyze, and Remediate Vulnerabilities
Cisco Extends Security Everywhere with Broader Visibility, Control, and Protection for Shadow IT, Endpoints, and the Cloud
Products and Releases  |  11/3/2015  | 
Threat Awareness Service Gives Organizations the Upper Hand in Securing the Network
Deep Instinct Launches First Commercially Available, Real-Time Cybersecurity Solution Based on Deep Learning
Products and Releases  |  11/3/2015  | 
Instantly detects and prevents zero-day and APT attacks across all endpoints and mobile devices
Covertix Secures Email Communications with SmartCipherTM
Products and Releases  |  11/3/2015  | 
Technology protects messages & attachments with tracking, encryption, and role-based classification

COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-30
Re:Desk 2.3 allows insecure file upload.
PUBLISHED: 2020-09-30
Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for a...
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated ...
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system...
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attack...