Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2015
Page 1 / 2   >   >>
Security Startup ThreatQuotient Lands First Round of Seed Funding
Products and Releases  |  4/29/2015  | 
Blu Venture Investors, CIT, and the Virginia Tech Investor Network fund Seed Round to Accelerate Companys Go-To-Market Strategy
Open Cloud Consortium Collaborates With NOAA to Release Environmental Data
Products and Releases  |  4/29/2015  | 
Open Cloud Consortium's data alliance will make finding and accessing NOAA data easier, driving discovery
Quick Heal Launches in North America To Focus on IT Security for SMEs
Products and Releases  |  4/29/2015  | 
Global Data Security Leader Builds Upon 22-Year Track Record; Brings SEQRITE Product Line to North America for the First Time
Report: IoT-Connected Devices Leading to Rise in SSDP-based Reflection Attacks
Products and Releases  |  4/24/2015  | 
NSFOCUS Report States Online Gaming and Entertainment Sectors Continue to be High on the Target List and Attackers Are Becoming More Sophisticated
LOGbinder updates its Exchange, SQL Server and SharePoint Solutions
Products and Releases  |  4/24/2015  | 
Security analysts now get mailbox audit policy configuration management, SQL Server 2014 compatibility, LEEF output, performance improvements
Products and Releases  |  4/23/2015  | 
Extends Enterprise Apps to Any User Over Any Network, Blocking #1 Data Breach Attack Vector
Leading MSPs Form Industry Consortium
Products and Releases  |  4/22/2015  | 
Free Remote Management and Monitoring with Integrated Professional Services Automation the Foundation of New Built-By-MSPs-For-MSPs Consortium
Bivio Networks Demonstrates Real-Time Cyber Intelligence Solution
Products and Releases  |  4/22/2015  | 
Bivio FlowIntelligence solution combines industry leading OISF Suricata IDS/IPS and Symantec DeepSight datafeeds to deliver advanced threat intelligence and analysis on high speed networks
UnitedLex Redefines Managed Security With Context-Aware Service
Products and Releases  |  4/22/2015  | 
Best-of-Breed Managed Security Service Provides Fortune 500 Caliber Security Capabilities to Medium-Sized Businesses
Rapid7 Announces Integration of its Intruder Analytics Solution with Microsoft Office 365 to Improve Security and Transparency
Products and Releases  |  4/21/2015  | 
UserInsight integrates with New Microsoft Office 365 Management Activity API, enabling organizations to identify and investigate intruders across the entire ecosystem, from endpoint to cloud RSA Conference USA 2015
Products and Releases  |  4/21/2015  | 
Intel Extends and Integrates Enterprise Portfolio with Greater Network and Endpoint Visibility and Control; Provides New Solutions for Application Layer Exfiltration Protection
Athena and Rambus Cryptography Research Division Announce Solutions to Prevent Advanced Security Threats
Products and Releases  |  4/21/2015  | 
TeraFire Security IP Cores Are Now Shipping with DPA Countermeasures
Study Uncovers Fears of Potential Domino Effect from Cyberattacks
Products and Releases  |  4/21/2015  | 
While most C-level executives say cyberattacks can cause serious disruption to their own operation, many also express concerns about farther-reaching impact on the broader infrastructure at the local, state and national level
Promisec Launches Freemium Endpoint Monitoring Service
Products and Releases  |  4/21/2015  | 
Freemium Product Provides Critical MSSP/ OEM Support for Security Service Providers in Promisecs Partners Program
ISSA-LA Holds 7th Annual Cybercrime Information Security Summit
Products and Releases  |  4/21/2015  | 
World Renowned Cybersecurity Experts Converge at Southern California's Biggest Security Conference
VMware to Resell HyTrust Data Encryption and Key Management
Products and Releases  |  4/21/2015  | 
Solutions Will Support Data Security and Compliance; Enable Enterprise Migration to Hybrid Cloud
Watchful Software Showcases New Version of RightsWATCH at RSA
Products and Releases  |  4/21/2015  | 
Version 6.6 takes center stage at the RSA Conference at North Hall, booth #3026.
RSA Unveils Via Family of Smart Identity Solutions
Products and Releases  |  4/21/2015  | 
RSA Via Access: Engineered to Unite Security and Convenience in a SaaS-based Solution for Managing Access for Any User from Anywhere to Anything
RSA Security Analytics Now Extends Visibility from the Endpoint to the Cloud
Products and Releases  |  4/21/2015  | 
New Flexible Packaging Helps Ensure Cost Effective, Enterprise-Wide Visibility for Customers
AlienVault to Work with HP on Cyber Threat-Sharing Initiative
Products and Releases  |  4/21/2015  | 
Effort to Broaden Reach of Threat Intelligence Sharing by Connecting Threat Data from HP Threat Central and AlienVault Open Threat Exchange
Products and Releases  |  4/21/2015  | 
Between 2006 and 2013, Number of Data Security Breaches Reported to NY Attorney General Tripled, Exposing 22.8 Million Personal Records
CloudLock Expands Cloud Security Offering for Salesforce
Products and Releases  |  4/21/2015  | 
CloudLock expanded product portfolio helps organizations to secure sensitive data in the cloud and protect corporate assets from cyber threats
Centrify Launches Industrys First Cloud-based Privileged Identity Service
Products and Releases  |  4/21/2015  | 
Centrify Privilege Service Addresses Todays Hybrid IT Environments of On-Premises and Cloud-based Systems as the Most Comprehensive Privileged Identity Solution on the Market Today
Core Security Solution Addresses Enterprise Vulnerability Management Issues
Products and Releases  |  4/21/2015  | 
New Features Include Interactive Attack Paths, Enhanced Exploit Matching and Filtering, Flexible Reporting and Smart Card Authentication
Lastline Knowledge Base of Malware Intelligence with String Indexing Launches at RSA
Products and Releases  |  4/21/2015  | 
Vast, Structured Repository Offers an Average of 10 Times More Data per Malware Query than Other Threat Intelligence Stores
Skyhigh announces fix for cloud security blind spot
Products and Releases  |  4/20/2015  | 
Gurucul Protects Cloud Apps with Identity-based Threat Detection
Products and Releases  |  4/20/2015  | 
Cloud Analytics Platform Detects Hijacked Accounts and Insider Abuse to Prevent Data Leakage and Compliance Violations
ThetaRay Protects Banks from Fraud, Money Laundering, ATM Attacks
Products and Releases  |  4/20/2015  | 
New findings from 2015 North America DDoS report
Products and Releases  |  4/20/2015  | 
Survey shows heightened preparedness and adoption of hybrid technologies
Most Companies Lack Formal Policies to Manage Open Source Security Risks
Products and Releases  |  4/20/2015  | 
North Bridge and Black Duck Software announce ninth annual Future of Open Source survey results, revealing trends in corporate OSS use
Radware Introduces Industrys First Hybrid Cloud Based WAF Service
Products and Releases  |  4/20/2015  | 
Radware launches new Hybrid Cloud WAF Service a fully-managed service that provides unmatched protection from web application attacks.
GlobalSign expands mobile authentication support in its identity services platforms
Products and Releases  |  4/20/2015  | 
Enabling Organizations to Easily Deploy and Manage Identity for Everything With OAuth 2.0 for IAM, AirWatch Integration, Managed PKI and High-Availability CA Services
New survey data from Fortinet
Products and Releases  |  4/20/2015  | 
Third-party Research Reveals Consumer Behavior May Present Greater Challenges for Enterprises that Do not have the Right Security Protections in Place
Passages Helps Businesses Prevent Targeted Attacks, Defend the Network
Products and Releases  |  4/20/2015  | 
Company to demo new safe browsing solution at RSA Conference and present session Website Counterintelligence
Raytheon Announces $1.57 Billion Acquisition of Websense
Products and Releases  |  4/20/2015  | 
Raytheon and Vista Equity Partners enter agreement to form new cybersecurity company
Study: 82% of Organizations Expect a Cyberattack, Yet 35% Are Unable to Fill Open Security Jobs
Products and Releases  |  4/16/2015  | 
Global Talent Pool Reflects Urgent Skills Shortage and Hiring Delays
Former CISO of eBay Dave Cullinane Launches TruSTAR, First Global Anonymous Cyber Incident Sharing Platform for Enterprises
Products and Releases  |  4/16/2015  | 
Platform Addresses Urgent Need for Instantaneous Cyber Intelligence Sharing to Level the Playing Field for CISOs
Attivo Networks closes $8M Series A
Products and Releases  |  4/16/2015  | 
Led by Bain Capital Ventures Bain Capital Ventures Managing Director, Enrique Salem, Joins the Attivo Networks Board
NCR Signals Massive Makeover to Banking with Highly Secure Cloud-Based ATM Software Platform
Products and Releases  |  4/15/2015  | 
NCRs Kalpana software transforms the ATM channel, introducing ground-breaking security designed to eliminate malware and reduce total cost of ownership by up to 40%
OpenSAMM Consortium Launches Industrys First Public Benchmarking Data for Improving Software Security
Products and Releases  |  4/15/2015  | 
Pragmatic, Open Assessment Process Improves Usability by Enabling Organizations to Parse Data by Industry and Company Size
Products and Releases  |  4/15/2015  | 
PCI DSS 3.1 and supporting guidance helps organizations address vulnerabilities within SSL protocol that put payment data at risk; PA-DSS revision to follow
Products and Releases  |  4/15/2015  | 
Also Launches New European-based Security Operations Center for Follow-The-Sun Threat Intelligence Sharing and Invests in New Regional Initiatives
Onapsis Awarded Key Patent for Automated Cyber-Security Assessment of SAP Systems and Business-Critical Applications
Products and Releases  |  4/15/2015  | 
Enterprises gain assurance of rigorous methods to protect business-critical applications, processes and data from cyber-attacks
One Tap On Your Phone Logs You In, With SecureEnvoy OneSwipe
Products and Releases  |  4/15/2015  | 
Leading Security Innovator Debuts its OneSwipe Prototype at the RSA Conference in San Francisco April 20-24 Demonstrating its Windows 10 NFC
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.