Products and Releases

Content posted in December 2015
Dispel Emerges from Stealth, Introduces New Model for Digital Privacy Protection
Products and Releases  |  12/29/2015  | 
The worlds first one-click Privacy-as-a-Service platform that enables you to reclaim your privacy online with comprehensive content, identity, and location protection across mobile phones, computers and cloud services
Center for Internet Securitys Critical Security Controls V. 6.0 Downloads Top 12,560
Products and Releases  |  12/22/2015  | 
Three New Companion Guides to the CIS Controls Released
Rapid7 Automates API Security Testing to Reduce Risk in Web Applications
Products and Releases  |  12/18/2015  | 
AppSpider Now Compatible with Swagger Framework for Fully Automated API Testing
Nexusguard Introduces Software-Defined Networking to DDoS with Nexusguard AI
Products and Releases  |  12/18/2015  | 
Nexusguard AI Brings Automated Route Engineering, Real-Time Scrubbing Center Health, Capacity
Digital Guardian Secures $66 Million from Leading Financial Investment Firms as Worldwide Demand for Data Protection Accelerates
Products and Releases  |  12/18/2015  | 
Additional Funds will Fuel Product Innovation, Global Expansion and New Technology Partnerships for Digital Guardians Next Generation Data Protection Platform
Lack of Talent, Skills and Recruiting Among Challenges Facing Cyber Security Profession, Cybrary Survey Shows
Products and Releases  |  12/18/2015  | 
Over two-thirds of senior technology professionals recognize global shortage of skilled cyber security workers
Global survey by Gemalto reveals impact of data breaches on customer loyalty
Products and Releases  |  12/10/2015  | 
Global survey by Gemalto reveals impact of data breaches on customer loyalty. SHARE THIS Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.
Research: Global Privacy Rights Movement Poses New Business, Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years.
Viewer Beware: Internet Users 28 Times More Likely to Get Malware From Content Theft Sites, RiskIQ Study Uncovers
Products and Releases  |  12/10/2015  | 
Drive-by Downloads: Nearly Half of Malware Is Delivered To Users' Computers From Content Theft Sites Without Even Requiring Click on a Link
Intralinks Research: A Global Privacy Rights Movement Poses New Business and Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years
NEW YORK AND NEW JERSEY LAWMAKERS ANNOUNCE NEW CYBER PROTECTION TEAM
Products and Releases  |  12/9/2015  | 
After Lawmakers Year Long Push - National Guard Chooses Latham Armory as the Mission Command Site - Establishes New York and New Jersey As Leader In Counter-Terrorism & Cyber-Terrorism Research
SANS to Debut CISO Hot Topic Series at Scottsdale 2016 Cybersecurity Training Event
Products and Releases  |  12/9/2015  | 
Will Share How to Effectively Communicate to and Influence CEOs and Boards of Directors.
BrightPoint Security joins IBM Security App Exchange community
Products and Releases  |  12/8/2015  | 
entinel View Security Command Platform Part of Collaborative Development to Stay Ahead of Evolving Threats
ONLINE PRIVACY GETS A FACELIFT
Products and Releases  |  12/3/2015  | 
Own your social network and easy password management newest additions to privacy lineup from SpiderOak
CloudFlare Introduces HTTP/2 Support, Bringing All Customers Into the Modern Internet for Free
Products and Releases  |  12/3/2015  | 
The Size of the HTTP/2 Universe Doubles Today
Venafi Co-Authors New NIST Report on Managing & Securing SSH Keys
Products and Releases  |  12/3/2015  | 
Published Guidance Offers Enterprises Advice on How to Identify and Protect Against Root-Level Compromises
Symantec Expands Global Security Operations Centers With US$50 Million Investment
Products and Releases  |  12/2/2015  | 
Larger Asia-Pacific Presence Gives Customers More Comprehensive Monitoring and Intelligence to Stop Advanced Attacks
Advancements in Threat Intel Evolve to Deliver Early Warning of Cyber Attacks
Products and Releases  |  12/2/2015  | 
BrightPoint Security Delivers Industrys First Security Command Platform with Dynamic Insight to Predict Current Threats and Threat Changes Across Digital Ecosystems
ThreatQuotient Announces $10.2M in Series A Funding
Products and Releases  |  12/2/2015  | 
Investment strengthens ThreatQuotients ability to transform threat intelligence through innovative platform developed with analyst workflows and processes at its core.
Capgemini launches new identity as a service cybersecurity offering
Products and Releases  |  12/1/2015  | 
New offering leverages Capgeminis cloud automation services to provide organizations with more flexible, comprehensive and cost-effective identity and access management as a service
Thycotic Teams Up with Adobe to Bring Enhanced Privileged Account Security to Build Environments for Cloud Applications
Products and Releases  |  12/1/2015  | 
Global Leader in Digital Media and Digital Marketing Solutions Leverages Thycotic Secret Server in Bleeding Edge Security Automation Practices


RIP, 'IT Security'
Kevin Kurzawa, Senior Information Security Auditor,  11/13/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19367
PUBLISHED: 2018-11-20
Portainer through 1.19.2 provides an API endpoint (/api/users/admin/check) to verify that the admin user is already created. This API endpoint will return 404 if admin was not created and 204 if it was already created. Attackers can set an admin password in the 404 case.
CVE-2018-19335
PUBLISHED: 2018-11-20
Google Monorail before 2018-06-07 has a Cross-Site Search (XS-Search) vulnerability because CSV downloads are affected by CSRF, and calculations of download times (for requests with a crafted groupby value) can be used to obtain sensitive information about the content of bug reports.
CVE-2018-19334
PUBLISHED: 2018-11-20
Google Monorail before 2018-05-04 has a Cross-Site Search (XS-Search) vulnerability because CSV downloads are affected by CSRF, and calculations of download times (for requests with an unsupported axis) can be used to obtain sensitive information about the content of bug reports.
CVE-2018-10099
PUBLISHED: 2018-11-20
Google Monorail before 2018-04-04 has a Cross-Site Search (XS-Search) vulnerability because CSV downloads are affected by CSRF, and calculations of download times (for requests with duplicated columns) can be used to obtain sensitive information about the content of bug reports.
CVE-2018-17906
PUBLISHED: 2018-11-19
Philips iSite and IntelliSpace PACS, iSite PACS, all versions, and IntelliSpace PACS, all versions. Default credentials and no authentication within third party software may allow an attacker to compromise a component of the system.