Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2015
<<   <   Page 2 / 2
Invincea Integrates Cloud Analysis and Enterprise Response Capabilities at the Endpoint
Products and Releases  |  4/15/2015  | 
Delivers Comprehensive Ability to Contain, Identify and Respond to Targeted Attacks
EdgeWave Unveils Military-Grade Breach Identification Service
Products and Releases  |  4/15/2015  | 
EdgeWave EPIC Security Assurance Service Enables Organizations to Identify and Immediately Respond to Cyber Attacks
Top 5 US Banks Collaborate on Security
Products and Releases  |  4/15/2015  | 
Behavioral analytics and threat detection come together with financial industry data sharing consortium
Pwnie Express releases Internet of Evil Things report & SaaS tool
Products and Releases  |  4/15/2015  | 
Pwnie Express releases Internet of Evil Things report & SaaS tool
Mobile & Fraud: Merchants Lag Behind
Products and Releases  |  4/15/2015  | 
Worlds Largest Survey Focused on Fraud and the Mobile Channel Released by Kount, CardNotPresent.com and the Fraud Practice; While Fraud Spikes, Uncertainties Abound and Protections Wane
RSA Joins CForum as Founding Member
Products and Releases  |  4/15/2015  | 
Industry-led Organization Advances the Cybersecurity Framework through Collaboration
Informatica Introduces Industry's First Data Security Intelligence Software
Products and Releases  |  4/14/2015  | 
Informatica [email protected] Subscription Solution Delivers Innovative New Approach to Keeping Data Safe in the Age of Data Breaches and Global Privacy
Deceptive New Tactics Give Advanced Attackers Free Reign Over Corporate Networks
Products and Releases  |  4/14/2015  | 
Symantec report reveals five out of six large companies were targeted in 2014, a 40 percent increase over the previous year
Intel Security Report Details Challenges Slowing Response to Targeted Attacks
Products and Releases  |  4/14/2015  | 
28% of Security Incidents Are Targeted Attacks; Product Integration, Event Comprehension, and Insufficient Skills Are Key Challenges to Timely Incident Response
Illumio Raises $100 Million to Deliver Adaptive Security to the 80 Percent of Data Center and Public Cloud That Perimeter Technologies Fail to Protect
Products and Releases  |  4/14/2015  | 
New Investors BlackRock Funds, Accel Partners and Others Join Existing Venture Investors and Industry Leaders John W. Thompson, Marc Benioff and Jerry Yang
Marlin Equity Partners to Acquire Fidelis Cybersecurity Solutions from General Dynamics
Products and Releases  |  4/14/2015  | 
Investment to drive increased visibility and accelerate Fidelis Cybersecuritys growth by capitalizing on Advanced Threat Defense market opportunity expected to near $1 billion in 2016*
Rsignia Enters Strategic Partnership with the Cyber Research Institute
Products and Releases  |  4/14/2015  | 
The companies will work together on cyber security R&D.
New Technology Identifies "Cookie-less" Online Tracking
Products and Releases  |  4/14/2015  | 
New website monitoring capability identifies third parties using fingerprinting tracking techniques; allows companies to provide their customers with notice and the choice to opt-out.
Akamai Cloud Security Intelligence Provides Foundation for Security Services
Products and Releases  |  4/14/2015  | 
Unprecedented Visibility Equates to Greater Accuracy, Faster Response to Web Attacks
Cradlepoint Closes $48 Million Growth Equity Financing
Products and Releases  |  4/13/2015  | 
Leader in cloud-managed 4G LTE networking accelerates expansion of company and solution portfolio
FireMon Acquires Immediate Insight
Products and Releases  |  4/13/2015  | 
Acquisition delivers first-ever combination of proactive network security intelligence and real-time security event analysis
Pertino Brings Zero-Trust Networking to the Wide Area Network
Products and Releases  |  4/10/2015  | 
Pertino Combines Secure Overlays, Network Virtualization And Multi-Layer Authentication To Address The Network Security Challenges Of Distributed Workforces And Workloads
Carolina Advanced Digital Nets $20B NASA Contract
Products and Releases  |  4/9/2015  | 
SEWP V is a multi-award Government-Wide Acquisition Contract (GWAC) vehicle focused on IT products and product based services. Carolina Advanced Digital will provide a variety of technology and cyber security products and services through this contract, which is currently used by all Federal Government agencies.
Vera Ushers in 'New Era of Data Security'
Products and Releases  |  4/9/2015  | 
Veradocs Emerges From Stealth, Renamed Vera, Unveiling Product and Customer Momentum
Singtel to Acquire Trustwave to Bolster Global Cyber Security Capabilities
Products and Releases  |  4/8/2015  | 
New strategic investor to help take Trustwave to the next level by accelerating growth
IOActives Global Call to Action: Smart Cities Must Protect Citizens from Emerging Cyber Security Threats
Products and Releases  |  4/8/2015  | 
Company releases white paper on the emerging threats cities face
Akamai Joins Series A Financing for Rubicon Labs
Products and Releases  |  4/8/2015  | 
Strategic investment links two firms dedicated to foiling cyberattacks
iSIGHT Partners Acquires Critical Intelligence
Products and Releases  |  4/7/2015  | 
Creates the Worlds Most Extensive Cyber Threat Intelligence Coverage for Critical Infrastructure and Industrial Control Systems
Trend Micro Survey Analyzes Critical Infrastructure Vulnerability
Products and Releases  |  4/7/2015  | 
Respondents include policymakers, industry leaders in Latin American and Caribbean countries
Survey Reveals Disconnect Between Perception and Use of Cyber Threat
Products and Releases  |  4/6/2015  | 
Report Indicates Companies at Higher Risk of Cyber Attacks without Threat Intelligence; Timely, Accurate and Actionable Information is Critical to be Effective
Intermedia AppID Enterprise Introduces User Empowered Identity
Products and Releases  |  4/6/2015  | 
People-centric approach allows users to respond to suspicious activities associated with their identity.
Check Point to Acquire Lacoon Mobile Security
Products and Releases  |  4/2/2015  | 
Expands Check Point's Strategic Focus to Secure the Mobile World
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.