Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2015
<<   <   Page 2 / 2
Invincea Integrates Cloud Analysis and Enterprise Response Capabilities at the Endpoint
Products and Releases  |  4/15/2015  | 
Delivers Comprehensive Ability to Contain, Identify and Respond to Targeted Attacks
EdgeWave Unveils Military-Grade Breach Identification Service
Products and Releases  |  4/15/2015  | 
EdgeWave EPIC Security Assurance Service Enables Organizations to Identify and Immediately Respond to Cyber Attacks
Top 5 US Banks Collaborate on Security
Products and Releases  |  4/15/2015  | 
Behavioral analytics and threat detection come together with financial industry data sharing consortium
Pwnie Express releases Internet of Evil Things report & SaaS tool
Products and Releases  |  4/15/2015  | 
Pwnie Express releases Internet of Evil Things report & SaaS tool
Mobile & Fraud: Merchants Lag Behind
Products and Releases  |  4/15/2015  | 
Worlds Largest Survey Focused on Fraud and the Mobile Channel Released by Kount, CardNotPresent.com and the Fraud Practice; While Fraud Spikes, Uncertainties Abound and Protections Wane
RSA Joins CForum as Founding Member
Products and Releases  |  4/15/2015  | 
Industry-led Organization Advances the Cybersecurity Framework through Collaboration
Informatica Introduces Industry's First Data Security Intelligence Software
Products and Releases  |  4/14/2015  | 
Informatica [email protected] Subscription Solution Delivers Innovative New Approach to Keeping Data Safe in the Age of Data Breaches and Global Privacy
Deceptive New Tactics Give Advanced Attackers Free Reign Over Corporate Networks
Products and Releases  |  4/14/2015  | 
Symantec report reveals five out of six large companies were targeted in 2014, a 40 percent increase over the previous year
Intel Security Report Details Challenges Slowing Response to Targeted Attacks
Products and Releases  |  4/14/2015  | 
28% of Security Incidents Are Targeted Attacks; Product Integration, Event Comprehension, and Insufficient Skills Are Key Challenges to Timely Incident Response
Illumio Raises $100 Million to Deliver Adaptive Security to the 80 Percent of Data Center and Public Cloud That Perimeter Technologies Fail to Protect
Products and Releases  |  4/14/2015  | 
New Investors BlackRock Funds, Accel Partners and Others Join Existing Venture Investors and Industry Leaders John W. Thompson, Marc Benioff and Jerry Yang
Marlin Equity Partners to Acquire Fidelis Cybersecurity Solutions from General Dynamics
Products and Releases  |  4/14/2015  | 
Investment to drive increased visibility and accelerate Fidelis Cybersecuritys growth by capitalizing on Advanced Threat Defense market opportunity expected to near $1 billion in 2016*
Rsignia Enters Strategic Partnership with the Cyber Research Institute
Products and Releases  |  4/14/2015  | 
The companies will work together on cyber security R&D.
New Technology Identifies "Cookie-less" Online Tracking
Products and Releases  |  4/14/2015  | 
New website monitoring capability identifies third parties using fingerprinting tracking techniques; allows companies to provide their customers with notice and the choice to opt-out.
Akamai Cloud Security Intelligence Provides Foundation for Security Services
Products and Releases  |  4/14/2015  | 
Unprecedented Visibility Equates to Greater Accuracy, Faster Response to Web Attacks
Cradlepoint Closes $48 Million Growth Equity Financing
Products and Releases  |  4/13/2015  | 
Leader in cloud-managed 4G LTE networking accelerates expansion of company and solution portfolio
FireMon Acquires Immediate Insight
Products and Releases  |  4/13/2015  | 
Acquisition delivers first-ever combination of proactive network security intelligence and real-time security event analysis
Pertino Brings Zero-Trust Networking to the Wide Area Network
Products and Releases  |  4/10/2015  | 
Pertino Combines Secure Overlays, Network Virtualization And Multi-Layer Authentication To Address The Network Security Challenges Of Distributed Workforces And Workloads
Carolina Advanced Digital Nets $20B NASA Contract
Products and Releases  |  4/9/2015  | 
SEWP V is a multi-award Government-Wide Acquisition Contract (GWAC) vehicle focused on IT products and product based services. Carolina Advanced Digital will provide a variety of technology and cyber security products and services through this contract, which is currently used by all Federal Government agencies.
Vera Ushers in 'New Era of Data Security'
Products and Releases  |  4/9/2015  | 
Veradocs Emerges From Stealth, Renamed Vera, Unveiling Product and Customer Momentum
Singtel to Acquire Trustwave to Bolster Global Cyber Security Capabilities
Products and Releases  |  4/8/2015  | 
New strategic investor to help take Trustwave to the next level by accelerating growth
IOActives Global Call to Action: Smart Cities Must Protect Citizens from Emerging Cyber Security Threats
Products and Releases  |  4/8/2015  | 
Company releases white paper on the emerging threats cities face
Akamai Joins Series A Financing for Rubicon Labs
Products and Releases  |  4/8/2015  | 
Strategic investment links two firms dedicated to foiling cyberattacks
iSIGHT Partners Acquires Critical Intelligence
Products and Releases  |  4/7/2015  | 
Creates the Worlds Most Extensive Cyber Threat Intelligence Coverage for Critical Infrastructure and Industrial Control Systems
Trend Micro Survey Analyzes Critical Infrastructure Vulnerability
Products and Releases  |  4/7/2015  | 
Respondents include policymakers, industry leaders in Latin American and Caribbean countries
Survey Reveals Disconnect Between Perception and Use of Cyber Threat
Products and Releases  |  4/6/2015  | 
Report Indicates Companies at Higher Risk of Cyber Attacks without Threat Intelligence; Timely, Accurate and Actionable Information is Critical to be Effective
Intermedia AppID Enterprise Introduces User Empowered Identity
Products and Releases  |  4/6/2015  | 
People-centric approach allows users to respond to suspicious activities associated with their identity.
Check Point to Acquire Lacoon Mobile Security
Products and Releases  |  4/2/2015  | 
Expands Check Point's Strategic Focus to Secure the Mobile World
<<   <   Page 2 / 2

How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-03
The Java client for the Datadog API before version 1.0.0-beta.9 has a local information disclosure of sensitive information downloaded via the API using the API Client. The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive info...
PUBLISHED: 2021-03-03
resources/public/js/orchestrator.js in openark orchestrator before 3.2.4 allows XSS via the orchestrator-msg parameter.
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home &gt; Management &gt; Documents &gt; Add, or /front/documen...
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability in the /ajax/common.tabs.php endpoint, indeed, at least two parameters _target and id are not proper...
PUBLISHED: 2021-03-03
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is an XSS vulnerability involving a logged in user while updating a ticket.