Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in December 2016
COALFIRE ANNOUNCES ACQUISITION OF CYBER SECURITY LEADER, VERIS GROUP
Products and Releases  |  12/28/2016  | 
Combination Positions Coalfire with New Cyber Risk, Compliance, and Technical Testing Capabilities
BIO-key Debuts Wearable Fingerprint Reader for New Devices At CES
Products and Releases  |  12/27/2016  | 
BIO-key to show wearable fingerprint reader for Windows, Micro USB Fingerprint Reader for Android and Biometric Padlocks
SECDO Completes $10M Funding to Revolutionize Security Incident Response
Products and Releases  |  12/22/2016  | 
Investment was led by the Rafael Development Corporation (RDC) and Check Point Co-founder & Chairman Marius Nacht
Cybersecurity Is Maturing, People Still the Problem: Nuix
Products and Releases  |  12/19/2016  | 
A Nuix executive survey discovered cybersecurity approaches are maturing, but spending is misdirected and human behavior is the largest security threat.
Consumers More Worried About Cybercrime Than Physical World Crime: Sophos
Products and Releases  |  12/14/2016  | 
A Sophos survey discovered consumers are more concerned about cybercrime than physical world crime, yet awareness of phishing scams and ransomware remains low.
Symantec Files Patent Infringement Suit Against Zscaler, Inc.
Products and Releases  |  12/12/2016  | 
Company Takes Legal Action to Safeguard Patented Technologies
PCI SECURITY STANDARDS COUNCIL PUBLISHES SUPPLEMENTAL PCI DSS SCOPING GUIDANCE
Products and Releases  |  12/9/2016  | 
Guidance Clarifies Scoping Principles Outlined in the PCI Data Security Standard
Mach37 Announces New Platinum Sponsor: General Dynamics Mission Systems
Products and Releases  |  12/8/2016  | 
Private sector sponsorship expedites Virginias quest to become the cybersecurity capital of the world.
Dell Unveils Dell Data Protection | Secure Lifecycle: Next-Generation Data Protection for the Entire Data Lifecycle
Products and Releases  |  12/2/2016  | 
Secures critical business documents and maintains protection as data moves across devices Provides IT with the authority to enact data leakage prevention, digital rights management and file access monitoring Expands visibility of where and how businesses access their data with granular policy controls capabilities
Cloud Security Alliance Launches Crowdfunded Cloud Security Management Tool
Products and Releases  |  12/2/2016  | 
The STARWatch SaaS application was designed to help organizations manage compliance and risks using CSA standards and best practices.
Infinite Group Inc. Introduces Nodeware Vulnerability Management Solution
Products and Releases  |  12/2/2016  | 
Nodewares plug-and-play system is intended to simplify and enhance security for SMBs.
Americans Fear Russian Hackers: Alertsec Survey
Products and Releases  |  12/1/2016  | 
Alertsecs 2016 Security Breach Study reveals that 2016 hacks changed security practices and that Americans worry about Russian hackers


Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19645
PUBLISHED: 2019-12-09
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
CVE-2019-19678
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the generic field entry point via the Generic Test Definition field of a new Generic Test issue.
CVE-2019-19679
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the Pre-Condition Summary entry point via the summary field of a Create Pre-Condition action for a new Test Issue.
CVE-2019-19647
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
CVE-2019-19648
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.