Products and Releases

Content posted in March 2015
Tanium Secures Additional $52 Million Investment from Andreessen Horowitz
Products and Releases  |  3/31/2015  | 
Leading venture capital firm doubles down on initial investment, looking to help further accelerate growth and support unprecedented market demand for a new approach to security and systems management
Survey: Security Pros Have Critical Concerns About Infosec
Products and Releases  |  3/31/2015  | 
Despite increased Board Room visibility and expanded budgets to combat cyber-attacks, security progress remains slow in its transformation of the data center.
Intermedia Intros 'User Empowered Identity' Solution
Products and Releases  |  3/31/2015  | 
Takes a people-centric approach to security by allowing users to respond to suspicious activities associated with their identity.
Thales Launches BYO-Key Service for Microsoft Azure Cloud
Products and Releases  |  3/31/2015  | 
Unique bring your own key capability enables you to have total control over your keys and sensitive data in the Azure Cloud.
IID Cyberthreat Sharing Platform Gets Additional Data Source
Products and Releases  |  3/31/2015  | 
Threat Intelligence will be available as part of IIDs commercial cyberthreat data exchange
Security Mentor Partners with Center for Internet Security
Products and Releases  |  3/31/2015  | 
Security Mentor makes its award-winning security awareness training program affordable for SLTT government entities through Center for Internet Securitys purchasing alliance program
Krowdthink Launches The Krowd to Connect People in Places
Products and Releases  |  3/30/2015  | 
First location-based social networking service that does not track location and built upon a strong privacy and trust model
PCI Council Publishes Guidance On Penetration Testing
Products and Releases  |  3/26/2015  | 
Recommendations to help organizations address top security challenge area.
Startup Hot Seat: Four Enterprise Tech Startups Chosen to Pitch Ideas to IT Community at Interop Las Vegas
Products and Releases  |  3/26/2015  | 
Non-Profits and Industry Associations Explore New IT Standards in Future of Tech Sessions
Cylance Researchers Discover Critical Vulnerability Affecting Hotel Chains Worldwide
Products and Releases  |  3/26/2015  | 
Millions of Customers Using Guest WiFi Potentially Impacted
Menlo Security Finds High Risk in Trusted Websites
Products and Releases  |  3/25/2015  | 
"State of the Web 2015: Vulnerability Report" identifies one in three top Alexa websites as risky
Black Lotus Quarterly Threat Report Reveals Average DDoS Attack Tripled in Volume
Products and Releases  |  3/25/2015  | 
Total attack frequency drops 44 percent in Q4 2014, confirming companys forecast of fewer, more complex methods
Blue Coat Global Intelligence Network Helps Customers Block, Detect and Respond to Advanced Threats
Products and Releases  |  3/25/2015  | 
Unification of Products and Labs Produces Single Stream of Web and Malware Threat Intelligence to Deliver Unprecedented Protection While Reducing the Total Cost of Security
Windows Server 2003 End-of-Life Survey Finds Nearly One in Three Companies Will Miss Deadline, Leaving Nearly 3 Million Servers Vulnerable to Breach
Products and Releases  |  3/25/2015  | 
Poll of 500 U.S. and U.K. enterprises finds more than half do not know deadline date
Game App Embarrassment Illustrates Bring Your Own Device (BYOD) Risk for Enterprises, According to New Flexera Software/IDC Survey Report
Products and Releases  |  3/25/2015  | 
Most enterprises are not testing mobile apps for risky behaviors that could invite hidden, back-door security risk and reputational damage
ProtonMail Raises $2M USD
Products and Releases  |  3/25/2015  | 
High security email service dramatically accelerating development to meet immense demand
BeyondTrust Survey Finds That More Than One Out of Four Organizations Have No Controls Over Privileged Access
Products and Releases  |  3/24/2015  | 
Fragmented priorities, total cost of ownership seen as inhibitors of enterprise adoption
Protectwise Emerges From Stealth With More Than $17 Million In Funding To Launch Worlds First Cloud DVR For Enterprise Security
Products and Releases  |  3/24/2015  | 
Disruptive Platform Creates a Long Term, Full-Fidelity Network Memory in the Cloud with a Time Machine for Threat Detection
Raketu Intros Secure, Private Moblle Messaging App
Products and Releases  |  3/24/2015  | 
Privacy features lets you delete sent messages on receiver's device; eliminates 'text regret.'
IOActive Launches New Hardware Lab
Products and Releases  |  3/23/2015  | 
Company adds new Global 50 clients to roster, expands into Middle East
New York City Police Department Auxiliary Officer Charged with Hacking into NYPD Computer and FBI Database
Products and Releases  |  3/19/2015  | 
Defendant Obtained Personal Identifying Information of Traffic-Accident Victims and Fraudulently Posed as an Attorney Soliciting Clients
Waratek Provides Detection of SQL Injection Attacks
Products and Releases  |  3/19/2015  | 
Waratek AppSecurity for Java Product Eliminates False Positives Associated with Heuristic and Signature-based Solutions including WAFs
Over a third of US IT professionals plan to launch an insider threat program this year
Products and Releases  |  3/19/2015  | 
Continual high-profile internal security breaches prompt a surge in preventative measures against insider threat
Intermedia AppID Enterprise Increases Security and Improves User Experience with a New Password Management Solution
Products and Releases  |  3/12/2015  | 
Intermedia AppID Enterprise implements Dynamic Password Management to reduce human interaction with web application passwords
HP Granted FedRAMP Authorization for Government Agencies to Use HP Fortify on Demand
Products and Releases  |  3/12/2015  | 
HP Fortify on Demand First Security Software-as-a-Service (SaaS) Offering to Achieve Approval
Blue Coat to be Acquired by Bain Capital
Products and Releases  |  3/11/2015  | 
Deal valued at $2.4 Billion, Prepares Company for Return to Public Markets
CloudFlare Solves an Industry-Wide DNS Security Problem, Shields DNS Infrastructure from Attacks
Products and Releases  |  3/11/2015  | 
Virtual DNS Protects and Supercharges DNS Servers, Mitigating one of the Most Common Infrastructure VulnerabilitiesDistributed Denial of Service Attacks (DDoS)
Check Point Introduces Threat Extraction for Zero Malware in Zero Seconds
Products and Releases  |  3/11/2015  | 
New Anti-Threat Solution Ensures the Fastest 100% Removal of Threats
Three Defendants Charged with One of the Largest Reported Data Breaches in U.S. History
Products and Releases  |  3/6/2015  | 
One Of The Defendants Has Already Pleaded Guilty
Healthcare Organizations Lack Tools for Cyber Situational Awareness and Threat Assessment
Products and Releases  |  3/4/2015  | 
HITRUST Transforms Model for Effective Cyber Risk Management
Cloud Security Alliance Announces Release of Security Framework for Governmental Clouds
Products and Releases  |  3/4/2015  | 
Report jointly developed by CSA, ENISA and TU Darmstadt Provides Step-by-Step Approach for the Procurement and Secure Use of Cloud Services
News: RADAR goes international/manages breaches in EU
Products and Releases  |  3/4/2015  | 
Award-winning Incident Response Management Software Streamlines EU Data Breach Notification Obligations to Make Managing Security Incidents Even Easier
Dtex Systems Closes $15M Series A Funding to Expand to U.S. Market and Relocate Headquarters to Silicon Valley
Products and Releases  |  3/3/2015  | 
Dtexs Endpoint Security Technology Provides Comprehensive Insider Threat Protection and Safeguards Employee Privacy to Uphold International Privacy Laws
PandaLabs neutralized 75 million new malware samples in 2014, twice as many as in 2013
Products and Releases  |  3/3/2015  | 
PandaLabs recorded an average of 200,000 new malware strains per day; and 34% of all malware ever created was coded in 2014.
Hypori Unveils Virtual Mobile Infrastructure at Mobile World Congress
Products and Releases  |  3/3/2015  | 
First Public Demonstration of Android Cloud Environment Ushers in Next-Generation of Secure BYOD
Survey Report: Majority of Service Providers Experienced DDoS Attacks, 85 Percent Experienced Customer Churn As a Result
Products and Releases  |  3/2/2015  | 
Nearly all participants have a solution in place, but most are insufficient
Proofpoint Signs Definitive Agreement to Acquire Emerging Threats; Enhances Threat Intelligence, Detection and Response
Products and Releases  |  3/2/2015  | 
Acquisition of leading threat intelligence company will extend Proofpoints solutions for detecting and responding to advanced threats
VOIPSEC Launches Voice Firewall Solution For Cost-Effective Voice-Over-Ip Security
Products and Releases  |  3/2/2015  | 
-Cloud-based, freemium model provides SMEs with essential first tier of voice security, mitigating increasing risk of VoIP infrastructure breaches-
Tempered Networks Raises $15 million in Series A Funding
Products and Releases  |  3/2/2015  | 
Led by Ignition Partners with participation from IDG Ventures, funding furthers commitment to protecting critical infrastructure and information against cyber security threats
Radware Introduces New Attack Mitigation Platform for High Volume Cyber-Attacks
Products and Releases  |  3/2/2015  | 
Latest Radware platform boasts up to 300Gbps mitigation capacity and handles 230 million packets per second of attack traffic to defend against evolving and growing cyber-attacks


New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.