Products and Releases

Content posted in December 2015
Dispel Emerges from Stealth, Introduces New Model for Digital Privacy Protection
Products and Releases  |  12/29/2015  | 
The worlds first one-click Privacy-as-a-Service platform that enables you to reclaim your privacy online with comprehensive content, identity, and location protection across mobile phones, computers and cloud services
Center for Internet Securitys Critical Security Controls V. 6.0 Downloads Top 12,560
Products and Releases  |  12/22/2015  | 
Three New Companion Guides to the CIS Controls Released
Rapid7 Automates API Security Testing to Reduce Risk in Web Applications
Products and Releases  |  12/18/2015  | 
AppSpider Now Compatible with Swagger Framework for Fully Automated API Testing
Nexusguard Introduces Software-Defined Networking to DDoS with Nexusguard AI
Products and Releases  |  12/18/2015  | 
Nexusguard AI Brings Automated Route Engineering, Real-Time Scrubbing Center Health, Capacity
Digital Guardian Secures $66 Million from Leading Financial Investment Firms as Worldwide Demand for Data Protection Accelerates
Products and Releases  |  12/18/2015  | 
Additional Funds will Fuel Product Innovation, Global Expansion and New Technology Partnerships for Digital Guardians Next Generation Data Protection Platform
Lack of Talent, Skills and Recruiting Among Challenges Facing Cyber Security Profession, Cybrary Survey Shows
Products and Releases  |  12/18/2015  | 
Over two-thirds of senior technology professionals recognize global shortage of skilled cyber security workers
Global survey by Gemalto reveals impact of data breaches on customer loyalty
Products and Releases  |  12/10/2015  | 
Global survey by Gemalto reveals impact of data breaches on customer loyalty. SHARE THIS Nearly two-thirds of consumers surveyed say they are unlikely to do business again with a company that had experienced a data breach where financial information was stolen.
Research: Global Privacy Rights Movement Poses New Business, Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years.
Viewer Beware: Internet Users 28 Times More Likely to Get Malware From Content Theft Sites, RiskIQ Study Uncovers
Products and Releases  |  12/10/2015  | 
Drive-by Downloads: Nearly Half of Malware Is Delivered To Users' Computers From Content Theft Sites Without Even Requiring Click on a Link
Intralinks Research: A Global Privacy Rights Movement Poses New Business and Economic Risks
Products and Releases  |  12/10/2015  | 
Over 70% of respondents expect to increase spending in order to meet data sovereignty requirements, 30% expect budgets to rise by more than 10% over the next two years
NEW YORK AND NEW JERSEY LAWMAKERS ANNOUNCE NEW CYBER PROTECTION TEAM
Products and Releases  |  12/9/2015  | 
After Lawmakers Year Long Push - National Guard Chooses Latham Armory as the Mission Command Site - Establishes New York and New Jersey As Leader In Counter-Terrorism & Cyber-Terrorism Research
SANS to Debut CISO Hot Topic Series at Scottsdale 2016 Cybersecurity Training Event
Products and Releases  |  12/9/2015  | 
Will Share How to Effectively Communicate to and Influence CEOs and Boards of Directors.
BrightPoint Security joins IBM Security App Exchange community
Products and Releases  |  12/8/2015  | 
entinel View Security Command Platform Part of Collaborative Development to Stay Ahead of Evolving Threats
ONLINE PRIVACY GETS A FACELIFT
Products and Releases  |  12/3/2015  | 
Own your social network and easy password management newest additions to privacy lineup from SpiderOak
CloudFlare Introduces HTTP/2 Support, Bringing All Customers Into the Modern Internet for Free
Products and Releases  |  12/3/2015  | 
The Size of the HTTP/2 Universe Doubles Today
Venafi Co-Authors New NIST Report on Managing & Securing SSH Keys
Products and Releases  |  12/3/2015  | 
Published Guidance Offers Enterprises Advice on How to Identify and Protect Against Root-Level Compromises
Symantec Expands Global Security Operations Centers With US$50 Million Investment
Products and Releases  |  12/2/2015  | 
Larger Asia-Pacific Presence Gives Customers More Comprehensive Monitoring and Intelligence to Stop Advanced Attacks
Advancements in Threat Intel Evolve to Deliver Early Warning of Cyber Attacks
Products and Releases  |  12/2/2015  | 
BrightPoint Security Delivers Industrys First Security Command Platform with Dynamic Insight to Predict Current Threats and Threat Changes Across Digital Ecosystems
ThreatQuotient Announces $10.2M in Series A Funding
Products and Releases  |  12/2/2015  | 
Investment strengthens ThreatQuotients ability to transform threat intelligence through innovative platform developed with analyst workflows and processes at its core.
Capgemini launches new identity as a service cybersecurity offering
Products and Releases  |  12/1/2015  | 
New offering leverages Capgeminis cloud automation services to provide organizations with more flexible, comprehensive and cost-effective identity and access management as a service
Thycotic Teams Up with Adobe to Bring Enhanced Privileged Account Security to Build Environments for Cloud Applications
Products and Releases  |  12/1/2015  | 
Global Leader in Digital Media and Digital Marketing Solutions Leverages Thycotic Secret Server in Bleeding Edge Security Automation Practices


Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/22/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.