Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in May 2014
LogmeOnce Adds Kill-Pill Technology to USB Two-Factor Authentication Token while Surpassing Kickstarter Goal
Products and Releases  |  5/28/2014  | 
LogmeOnce password manager will offer USB kill pill, USB geo location and USB decoy and file camouflage to protect against lost or stolen USB
Survey Reveals Many Organizations Fail to Implement Effective Password Security Practices
Products and Releases  |  5/28/2014  | 
Lieberman Software Survey Reveals Many Organizations Fail to Implement Effective Password Security Practices.
BioCatch Launches eCommerce Edition of Behavioral Analysis Solution
Products and Releases  |  5/28/2014  | 
Biometric Tool Prevents Fraud
Distil Networks Secures $10 Million in Series A Funding from Foundry Group and Techstars to Battle Malicious Bots
Products and Releases  |  5/28/2014  | 
Company to focus on continued growth and advancing the war on bots
Sophos Mobile Control 4.0 Delivers User-Centric Approach to Protect, Secure and Manage Mobile Devices
Products and Releases  |  5/27/2014  | 
Only enterprise mobility management solution to offer individual file encryption, integrated AV and web filtering
RADAR is granted patent
Products and Releases  |  5/26/2014  | 
New open enterprise mobile app platform provides greater security
Products and Releases  |  5/23/2014  | 
Latest release of open, standards-based platform allows development teams to easily reuse mobile services and gives IT operations total visibility and control.
LynuxWorks Changes Company Name to Lynx Software Technologies
Products and Releases  |  5/23/2014  | 
New name reflects broad market adoption of LynxOS and LynxSecure products in connected embedded systems.
F5 Networks Acquires Defense.Net, Inc.
Products and Releases  |  5/23/2014  | 
Extends F5s security offerings with a highly scalable cloud-based DDoS mitigation service, engineered to absorb the largest attacks.
Ping Identity Delivers Mobile App for Single Sign-On Access to Thousands of Applications from Any Device
Products and Releases  |  5/23/2014  | 
One-Click Access for Business Apps With the Security Controls That IT Requires
Global Velocity Announces its New Approach to Cyber Security Today
Products and Releases  |  5/22/2014  | 
Securio provides a simple, cost-effective solution for protecting data stored in the enterprise or cloud.
LANDESK Boosts User-Oriented IT with Acquisition of LetMobile and New Application Wrapping Solution
Products and Releases  |  5/22/2014  | 
New technologies signal industry shift from mobile device-centered security to a user-oriented mobile approach
Tenable Announces Nessus Enterprise to Empower Team Collaboration for Vulnerability, Configuration and Compliance Assessment
Products and Releases  |  5/22/2014  | 
Nessus Enterprise Expands Use of Market-leading Scanning Tool for Administrators, Auditors and Security Analysts
More Than Half of European IT Managers Dont Fully Trust U.S. Cloud, Says New Perspecsys Study
Products and Releases  |  5/22/2014  | 
Sixty-two percent of respondents believe that this response is justified based on reports of the NSA having visibility into data in U.S.-based clouds
New open enterprise mobile app platform provides greater security
Products and Releases  |  5/22/2014  | 
Latest release of open, standards-based platform allows development teams to easily reuse mobile services and gives IT operations total visibility and control.
Emulex, Compuware Team to Drastically Improve Data Center Problem Identification and Resolution
Products and Releases  |  5/21/2014  | 
New Integration Empowers Operations and Network Teams to Resolve Issues Using Both Real-time and Retrospective Performance Analysis, With Packet-level Detail.
Norton Bolsters Small Business Cybersecurity Protection; Secures Multiple Devices in Minutes
Products and Releases  |  5/21/2014  | 
Promising 100 percent virus removal assurance, Norton Small Business protects information wherever it is, however it travels.
IBM Tackles Advanced Malware with Expanded Endpoint Protection Software
Products and Releases  |  5/21/2014  | 
Trusteer Apex Helps Block and Shut Down Cyber Attacks that Begin with Malware Exploits.
Proofpoint Acquires NetCitadel
Products and Releases  |  5/21/2014  | 
Automated security incident response and containment capabilities enable enterprises to respond to advanced threats in minutes instead of hours or days.
The FIDO Alliance Welcomes Visa to the Board of Directors
Products and Releases  |  5/21/2014  | 
Visa Europe will join the alliance as a sponsor member and will be represented on the board by Visa Inc.
Lancope Introduces StealthWatch FlowSensor 4000
Products and Releases  |  5/16/2014  | 
Appliance provides new levels of network visibility and security for defending the worlds largest networks from advanced attacks.
CipherCloud Research: InfoSecurity Europe Attendees Forge Forward with Cloud Adoption
Products and Releases  |  5/16/2014  | 
Cloud optimism outweighs surveillance and breach concerns; strong confidence in data protection technologies
Onapsis Inc. and Virtustream Establish an Alliance to Enhance Security of Global SAP Implementations
Products and Releases  |  5/16/2014  | 
The companies will showcase this partnership during the SAP-Sapphire and ASUG Annual User Conference.
EiQ Networks Launches SOCVue Online
Products and Releases  |  5/16/2014  | 
SOCVue helps small to medium enterprises improve cyber defenses and obtain a level of security on par with large enterprises
Lieberman Software Enables Audited, Privileged Access for Users from the Cloud to On-Premises
Products and Releases  |  5/16/2014  | 
Enterprise Random Password Manager Provides Unified Privilege Management Platform Across Multiple Environments.
Trend Micros Q1 Security Roundup Reveals Cybercriminals Advanced Methods for Executing Attacks on Wide Variety of Targets
Products and Releases  |  5/15/2014  | 
Cybercriminals targeting unlikely sources to carry out high-profile exploits.
Lumeta Expands Professional Services Portfolio with Launch of New Bundled Services
Products and Releases  |  5/15/2014  | 
New services include Lumeta Kick Start and Lumeta Tune Up
SanDisk Introduces Security-Certified Self-Encrypting Solid State Drive for Corporate Environments
Products and Releases  |  5/15/2014  | 
New X300s Client SSD Designed to Secure Enterprise & Employee Data
High-Tech Bridge launches online on-demand web penetration testing service ImmuniWeb
Products and Releases  |  5/14/2014  | 
On-demand ethical hacking service delivers new approach to website security assessment, manually-written report guarantees zero false-positives
Wave Unveils Management for the SanDisk X300s Solid-State Drive With Encryption to Secure Enterprise Data
Products and Releases  |  5/14/2014  | 
Each SanDisk X300s SSD(TM) Comes Exclusively Equipped With Wave's EMBASSY Security Center
Contactless Card Shipments Jump
Products and Releases  |  5/13/2014  | 
Smart Payment Association releases its annual review of the smart payment card market.
WidePoint Collaborates with Wave to Secure Digital Certificates Within Hardware for Today's Increasingly Mobile Workforce
Products and Releases  |  5/12/2014  | 
WidePoint Will Use Wave's EMBASSY Security Center and Cryptographic Service Provider (CSP) to Secure Digital Certificates within TPMs on Customer Devices
Promisec Announces General Availability of Promisec Integrity, Offering Endpoint Security in the Cloud
Products and Releases  |  5/12/2014  | 
Company Leverages Microsoft Azure Platform for Reliable, Enterprise-Grade Cloud Infrastructure
Invincea and ForeScout Partner to Protect End User Devices and Corporate Networks from Targeted Attacks
Products and Releases  |  5/7/2014  | 
ForeScout CounterACT to enforce enterprise-wide use of Invincea FreeSpace, ensuring end user devices including BYOD gain advanced cybersecurity defenses.
Security Startup Vorstack Announces $5.2 Million Funding Round
Products and Releases  |  5/7/2014  | 
Funds Used to Scale Automation and Control Platform for Enterprise Collaboration
CA Technologies Joins FIDO Alliance
Products and Releases  |  5/7/2014  | 
Group Aims to Advance Authentication and Remove Passwords from the Online Security Process.
Advanced Enterprise Penetration Testing Device Now Fits in Your Pocket
Products and Releases  |  5/7/2014  | 
Pwnie Express Unveils Next Generation State-of-the-Art Pwn Phone 2014.
Splunk Introduces Splunk Enterprise 6.1
Products and Releases  |  5/7/2014  | 
New Version Delivers Mission-critical Operational Intelligence to the Global Enterprise.
Varonis Unveils DatAnswers, Bringing Secure Enterprise Search of Human-Generated Data Files to Employees
Products and Releases  |  5/6/2014  | 
DatAnswers sits on top of and extends the Varonis Metadata Framework.
Ixia Network Visibility Solution Troubleshoots Availability Problems
Products and Releases  |  5/5/2014  | 
New Packet Capture Module helps customers quickly resolve network issues by capturing targeted packets for rapid resolution.
Symantec Unveils New Advanced Threat Protection
Products and Releases  |  5/5/2014  | 
Integrated approach and roadmap of organic innovation produce unparalleled defenses and more value.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.