Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2015
Tanium Secures Additional $52 Million Investment from Andreessen Horowitz
Products and Releases  |  3/31/2015  | 
Leading venture capital firm doubles down on initial investment, looking to help further accelerate growth and support unprecedented market demand for a new approach to security and systems management
Survey: Security Pros Have Critical Concerns About Infosec
Products and Releases  |  3/31/2015  | 
Despite increased Board Room visibility and expanded budgets to combat cyber-attacks, security progress remains slow in its transformation of the data center.
Intermedia Intros 'User Empowered Identity' Solution
Products and Releases  |  3/31/2015  | 
Takes a people-centric approach to security by allowing users to respond to suspicious activities associated with their identity.
Thales Launches BYO-Key Service for Microsoft Azure Cloud
Products and Releases  |  3/31/2015  | 
Unique bring your own key capability enables you to have total control over your keys and sensitive data in the Azure Cloud.
IID Cyberthreat Sharing Platform Gets Additional Data Source
Products and Releases  |  3/31/2015  | 
Threat Intelligence will be available as part of IIDs commercial cyberthreat data exchange
Security Mentor Partners with Center for Internet Security
Products and Releases  |  3/31/2015  | 
Security Mentor makes its award-winning security awareness training program affordable for SLTT government entities through Center for Internet Securitys purchasing alliance program
Krowdthink Launches The Krowd to Connect People in Places
Products and Releases  |  3/30/2015  | 
First location-based social networking service that does not track location and built upon a strong privacy and trust model
PCI Council Publishes Guidance On Penetration Testing
Products and Releases  |  3/26/2015  | 
Recommendations to help organizations address top security challenge area.
Startup Hot Seat: Four Enterprise Tech Startups Chosen to Pitch Ideas to IT Community at Interop Las Vegas
Products and Releases  |  3/26/2015  | 
Non-Profits and Industry Associations Explore New IT Standards in Future of Tech Sessions
Cylance Researchers Discover Critical Vulnerability Affecting Hotel Chains Worldwide
Products and Releases  |  3/26/2015  | 
Millions of Customers Using Guest WiFi Potentially Impacted
Menlo Security Finds High Risk in Trusted Websites
Products and Releases  |  3/25/2015  | 
"State of the Web 2015: Vulnerability Report" identifies one in three top Alexa websites as risky
Black Lotus Quarterly Threat Report Reveals Average DDoS Attack Tripled in Volume
Products and Releases  |  3/25/2015  | 
Total attack frequency drops 44 percent in Q4 2014, confirming companys forecast of fewer, more complex methods
Blue Coat Global Intelligence Network Helps Customers Block, Detect and Respond to Advanced Threats
Products and Releases  |  3/25/2015  | 
Unification of Products and Labs Produces Single Stream of Web and Malware Threat Intelligence to Deliver Unprecedented Protection While Reducing the Total Cost of Security
Windows Server 2003 End-of-Life Survey Finds Nearly One in Three Companies Will Miss Deadline, Leaving Nearly 3 Million Servers Vulnerable to Breach
Products and Releases  |  3/25/2015  | 
Poll of 500 U.S. and U.K. enterprises finds more than half do not know deadline date
Game App Embarrassment Illustrates Bring Your Own Device (BYOD) Risk for Enterprises, According to New Flexera Software/IDC Survey Report
Products and Releases  |  3/25/2015  | 
Most enterprises are not testing mobile apps for risky behaviors that could invite hidden, back-door security risk and reputational damage
ProtonMail Raises $2M USD
Products and Releases  |  3/25/2015  | 
High security email service dramatically accelerating development to meet immense demand
BeyondTrust Survey Finds That More Than One Out of Four Organizations Have No Controls Over Privileged Access
Products and Releases  |  3/24/2015  | 
Fragmented priorities, total cost of ownership seen as inhibitors of enterprise adoption
Protectwise Emerges From Stealth With More Than $17 Million In Funding To Launch Worlds First Cloud DVR For Enterprise Security
Products and Releases  |  3/24/2015  | 
Disruptive Platform Creates a Long Term, Full-Fidelity Network Memory in the Cloud with a Time Machine for Threat Detection
Raketu Intros Secure, Private Moblle Messaging App
Products and Releases  |  3/24/2015  | 
Privacy features lets you delete sent messages on receiver's device; eliminates 'text regret.'
IOActive Launches New Hardware Lab
Products and Releases  |  3/23/2015  | 
Company adds new Global 50 clients to roster, expands into Middle East
New York City Police Department Auxiliary Officer Charged with Hacking into NYPD Computer and FBI Database
Products and Releases  |  3/19/2015  | 
Defendant Obtained Personal Identifying Information of Traffic-Accident Victims and Fraudulently Posed as an Attorney Soliciting Clients
Waratek Provides Detection of SQL Injection Attacks
Products and Releases  |  3/19/2015  | 
Waratek AppSecurity for Java Product Eliminates False Positives Associated with Heuristic and Signature-based Solutions including WAFs
Over a third of US IT professionals plan to launch an insider threat program this year
Products and Releases  |  3/19/2015  | 
Continual high-profile internal security breaches prompt a surge in preventative measures against insider threat
Intermedia AppID Enterprise Increases Security and Improves User Experience with a New Password Management Solution
Products and Releases  |  3/12/2015  | 
Intermedia AppID Enterprise implements Dynamic Password Management to reduce human interaction with web application passwords
HP Granted FedRAMP Authorization for Government Agencies to Use HP Fortify on Demand
Products and Releases  |  3/12/2015  | 
HP Fortify on Demand First Security Software-as-a-Service (SaaS) Offering to Achieve Approval
Blue Coat to be Acquired by Bain Capital
Products and Releases  |  3/11/2015  | 
Deal valued at $2.4 Billion, Prepares Company for Return to Public Markets
CloudFlare Solves an Industry-Wide DNS Security Problem, Shields DNS Infrastructure from Attacks
Products and Releases  |  3/11/2015  | 
Virtual DNS Protects and Supercharges DNS Servers, Mitigating one of the Most Common Infrastructure VulnerabilitiesDistributed Denial of Service Attacks (DDoS)
Check Point Introduces Threat Extraction for Zero Malware in Zero Seconds
Products and Releases  |  3/11/2015  | 
New Anti-Threat Solution Ensures the Fastest 100% Removal of Threats
Three Defendants Charged with One of the Largest Reported Data Breaches in U.S. History
Products and Releases  |  3/6/2015  | 
One Of The Defendants Has Already Pleaded Guilty
Healthcare Organizations Lack Tools for Cyber Situational Awareness and Threat Assessment
Products and Releases  |  3/4/2015  | 
HITRUST Transforms Model for Effective Cyber Risk Management
Cloud Security Alliance Announces Release of Security Framework for Governmental Clouds
Products and Releases  |  3/4/2015  | 
Report jointly developed by CSA, ENISA and TU Darmstadt Provides Step-by-Step Approach for the Procurement and Secure Use of Cloud Services
News: RADAR goes international/manages breaches in EU
Products and Releases  |  3/4/2015  | 
Award-winning Incident Response Management Software Streamlines EU Data Breach Notification Obligations to Make Managing Security Incidents Even Easier
Dtex Systems Closes $15M Series A Funding to Expand to U.S. Market and Relocate Headquarters to Silicon Valley
Products and Releases  |  3/3/2015  | 
Dtexs Endpoint Security Technology Provides Comprehensive Insider Threat Protection and Safeguards Employee Privacy to Uphold International Privacy Laws
PandaLabs neutralized 75 million new malware samples in 2014, twice as many as in 2013
Products and Releases  |  3/3/2015  | 
PandaLabs recorded an average of 200,000 new malware strains per day; and 34% of all malware ever created was coded in 2014.
Hypori Unveils Virtual Mobile Infrastructure at Mobile World Congress
Products and Releases  |  3/3/2015  | 
First Public Demonstration of Android Cloud Environment Ushers in Next-Generation of Secure BYOD
Survey Report: Majority of Service Providers Experienced DDoS Attacks, 85 Percent Experienced Customer Churn As a Result
Products and Releases  |  3/2/2015  | 
Nearly all participants have a solution in place, but most are insufficient
Proofpoint Signs Definitive Agreement to Acquire Emerging Threats; Enhances Threat Intelligence, Detection and Response
Products and Releases  |  3/2/2015  | 
Acquisition of leading threat intelligence company will extend Proofpoints solutions for detecting and responding to advanced threats
VOIPSEC Launches Voice Firewall Solution For Cost-Effective Voice-Over-Ip Security
Products and Releases  |  3/2/2015  | 
-Cloud-based, freemium model provides SMEs with essential first tier of voice security, mitigating increasing risk of VoIP infrastructure breaches-
Tempered Networks Raises $15 million in Series A Funding
Products and Releases  |  3/2/2015  | 
Led by Ignition Partners with participation from IDG Ventures, funding furthers commitment to protecting critical infrastructure and information against cyber security threats
Radware Introduces New Attack Mitigation Platform for High Volume Cyber-Attacks
Products and Releases  |  3/2/2015  | 
Latest Radware platform boasts up to 300Gbps mitigation capacity and handles 230 million packets per second of attack traffic to defend against evolving and growing cyber-attacks


Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19645
PUBLISHED: 2019-12-09
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
CVE-2019-19678
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the generic field entry point via the Generic Test Definition field of a new Generic Test issue.
CVE-2019-19679
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the Pre-Condition Summary entry point via the summary field of a Create Pre-Condition action for a new Test Issue.
CVE-2019-19647
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
CVE-2019-19648
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.