Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2015
Dispel Emerges from Stealth, Introduces New Model for Digital Privacy Protection
Products and Releases  |  12/29/2015  | 
The worlds first one-click Privacy-as-a-Service platform that enables you to reclaim your privacy online with comprehensive content, identity, and location protection across mobile phones, computers and cloud services
Center for Internet Securitys Critical Security Controls V. 6.0 Downloads Top 12,560
Products and Releases  |  12/22/2015  | 
Three New Companion Guides to the CIS Controls Released
Rapid7 Automates API Security Testing to Reduce Risk in Web Applications
Products and Releases  |  12/18/2015  | 
AppSpider Now Compatible with Swagger Framework for Fully Automated API Testing
Nexusguard Introduces Software-Defined Networking to DDoS with Nexusguard AI
Products and Releases  |  12/18/2015  | 
Nexusguard AI Brings Automated Route Engineering, Real-Time Scrubbing Center Health, Capacity
Digital Guardian Secures $66 Million from Leading Financial Investment Firms as Worldwide Demand for Data Protection Accelerates
Products and Releases  |  12/18/2015  | 
Additional Funds will Fuel Product Innovation, Global Expansion and New Technology Partnerships for Digital Guardians Next Generation Data Protection Platform
Lack of Talent, Skills and Recruiting Among Challenges Facing Cyber Security Profession, Cybrary Survey Shows
Products and Releases  |  12/18/2015  | 
Over two-thirds of senior technology professionals recognize global shortage of skilled cyber security workers
Global survey by Gemalto reveals impact of data breaches on customer loyalty
Products and Releases  |  12/10/2015  | 
Global survey by Gemalto reveals impact of data breaches on customer loyalty. SHARE THIS Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.
Research: Global Privacy Rights Movement Poses New Business, Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years.
Viewer Beware: Internet Users 28 Times More Likely to Get Malware From Content Theft Sites, RiskIQ Study Uncovers
Products and Releases  |  12/10/2015  | 
Drive-by Downloads: Nearly Half of Malware Is Delivered To Users' Computers From Content Theft Sites Without Even Requiring Click on a Link
Intralinks Research: A Global Privacy Rights Movement Poses New Business and Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years
NEW YORK AND NEW JERSEY LAWMAKERS ANNOUNCE NEW CYBER PROTECTION TEAM
Products and Releases  |  12/9/2015  | 
After Lawmakers Year Long Push - National Guard Chooses Latham Armory as the Mission Command Site - Establishes New York and New Jersey As Leader In Counter-Terrorism & Cyber-Terrorism Research
SANS to Debut CISO Hot Topic Series at Scottsdale 2016 Cybersecurity Training Event
Products and Releases  |  12/9/2015  | 
Will Share How to Effectively Communicate to and Influence CEOs and Boards of Directors.
BrightPoint Security joins IBM Security App Exchange community
Products and Releases  |  12/8/2015  | 
entinel View Security Command Platform Part of Collaborative Development to Stay Ahead of Evolving Threats
ONLINE PRIVACY GETS A FACELIFT
Products and Releases  |  12/3/2015  | 
Own your social network and easy password management newest additions to privacy lineup from SpiderOak
CloudFlare Introduces HTTP/2 Support, Bringing All Customers Into the Modern Internet for Free
Products and Releases  |  12/3/2015  | 
The Size of the HTTP/2 Universe Doubles Today
Venafi Co-Authors New NIST Report on Managing & Securing SSH Keys
Products and Releases  |  12/3/2015  | 
Published Guidance Offers Enterprises Advice on How to Identify and Protect Against Root-Level Compromises
Symantec Expands Global Security Operations Centers With US$50 Million Investment
Products and Releases  |  12/2/2015  | 
Larger Asia-Pacific Presence Gives Customers More Comprehensive Monitoring and Intelligence to Stop Advanced Attacks
Advancements in Threat Intel Evolve to Deliver Early Warning of Cyber Attacks
Products and Releases  |  12/2/2015  | 
BrightPoint Security Delivers Industrys First Security Command Platform with Dynamic Insight to Predict Current Threats and Threat Changes Across Digital Ecosystems
ThreatQuotient Announces $10.2M in Series A Funding
Products and Releases  |  12/2/2015  | 
Investment strengthens ThreatQuotients ability to transform threat intelligence through innovative platform developed with analyst workflows and processes at its core.
Capgemini launches new identity as a service cybersecurity offering
Products and Releases  |  12/1/2015  | 
New offering leverages Capgeminis cloud automation services to provide organizations with more flexible, comprehensive and cost-effective identity and access management as a service
Thycotic Teams Up with Adobe to Bring Enhanced Privileged Account Security to Build Environments for Cloud Applications
Products and Releases  |  12/1/2015  | 
Global Leader in Digital Media and Digital Marketing Solutions Leverages Thycotic Secret Server in Bleeding Edge Security Automation Practices


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5595
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a buffer overflow vulnerability, which may allow a remote attacker to stop the network functions of the products or execute...
CVE-2020-5596
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) does not properly manage sessions, which may allow a remote attacker to stop the network functions of the products or execute a mali...
CVE-2020-5597
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a null pointer dereference vulnerability, which may allow a remote attacker to stop the network functions of the products o...
CVE-2020-5598
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper access control vulnerability, which may which may allow a remote attacker tobypass access restriction and stop ...
CVE-2020-5599
PUBLISHED: 2020-07-07
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability, which may allow a remo...