Products and Releases

Content posted in May 2015
New ISACA Events Serve Women in Security
Products and Releases  |  5/29/2015  | 
Free Webinar in June and CSX 2015 in October
New Survey Shows Lack of Confidence in Organizations' Cyber Security
Products and Releases  |  5/29/2015  | 
New Lieberman Software survey reveals that todays complicated IT security solutions are not being properly deployed and, for most organizations, compliance trumps security
Fortinet Announces Agreement to Acquire Meru Networks
Products and Releases  |  5/28/2015  | 
Acquisition Expected to Bolster Fortinets Secure Wireless Solutions, Add Enterprise Customers, and Expand Total Addressable Market
Imperva Unveils New Cloud Architecture to Maximize Protection of Data and Applications
Products and Releases  |  5/28/2015  | 
Imperva Skyfence, Provisioned on Imperva Incapsula, Provides Superior Levels of Security, Performance and Availability
Check Point Delivers SCADA Security Solutions to Protect Industrial Control Systems against Cyber Threats
Products and Releases  |  5/26/2015  | 
New hardened security appliance with most in depth SCADA security for your Critical Infrastructure
Promisec Brings a New Weapon to Combat Cyber Attackers with Release of Promisec Endpoint Manager 4.11
Products and Releases  |  5/26/2015  | 
Combining File Integrity Monitoring and File Reputation Scoring, PEM 4.11 provides Endpoint Detection and Remediation (EDR) of Advanced Threats at Enterprise scale
Fortinet Signs Collaborative Research and Development Agreement with U.S. Department of Homeland Security
Products and Releases  |  5/26/2015  | 
Sharing of Real-Time Security Data to Strengthen Threat Intelligence for Fortinet Customers Globally
Fox-IT Launches Web and Mobile Event Analytics Platform for U.S. Financial Services Industry
Products and Releases  |  5/26/2015  | 
Company will demonstrate DetACT at the 2015 FS-ISAC and BITS Annual Summit solution showcase
Delphix Acquires Data Masking Leader, Axis Technology Software
Products and Releases  |  5/22/2015  | 
Acquisition Adds Integrated Masking to Data as a Service Platform
Logentries Launches Low-Cost Security Information and Event Management (SIEM) Service for Easy, Real-time Security Analysis
Products and Releases  |  5/22/2015  | 
Industry-standard SIEM Service Enables Customers to Easily and Cost-effectively Meet Specific Compliance Requirements
MACH37 Cyber Accelerator Accepting Applications for Fall 2015 Session
Products and Releases  |  5/22/2015  | 
Fall 15 Cohort to Begin on September 8th
Veracode Introduces IAST for Enhanced Risk Reduction in DevOps and Agile Environments
Products and Releases  |  5/22/2015  | 
Continues Strategy of Incorporating Complementary Technologies via Open and Extensible Platform
OpenDNS First to Offer Threat Intelligence Cloud Enforcement Through APIs
Products and Releases  |  5/22/2015  | 
Leading Cloud Security Company Makes API Available for Customers To Enable Advanced Enforcement of Security Threats
Research Shows Workers Ignoring Known Cyber Risks, Surfing Adult Content and Downloading Unapproved Apps
Products and Releases  |  5/19/2015  | 
Global Survey Highlights Disconnect Between Employee Awareness of Cyber Threats and Their Actions
Decline in detected malware attacks in organisations coincides perfectly with weekends.
Products and Releases  |  5/15/2015  | 
Good Morning Monday Hello Cyber Attack
SANs Survey Reveals Organizations Lack Control Over Mobile Workspaces
Products and Releases  |  5/14/2015  | 
More than 64 Percent of Mobile Workers Can Access High Value Data Remotely while One in Three Devices Are Unmanaged
CoroNet Launches Solution to Protect from Eavesdropping, Data Interception and Remote Manipulation of Devices on WiFi and Cellular Networks
Products and Releases  |  5/13/2015  | 
CoroNets Enterprise Offering Helps Carriers, MSSPs and Device Manufacturers to Protect their Customers from the Fastest-Growing Cyber Threat
Digital Guardian Acquires Savant Protection
Products and Releases  |  5/13/2015  | 
Acquisition extends the Digital Guardian Data Aware Endpoint Security Platform to fixed-function devices
Absolute Survey Shows Millennials Represent Greatest Risk to Corporate Data
Products and Releases  |  5/13/2015  | 
Absolute Software Report Uncovers Usage Behavior and Security Risks of Connected Employees
Bitdefender Rolls Out New Technology for Virtualized Infrastructure Security
Products and Releases  |  5/13/2015  | 
Bitdefender defeats long-exploited advanced threat vectors in virtualized environments
Bracket Computing Announces High-Assurance Security Capabilities for Hyperscale Clouds
Products and Releases  |  5/13/2015  | 
Bracket Security Fabric Allows Large Enterprises to Move Their Most Sensitive Workloads to the Public Cloud with Confidence
LiveEnsure Launches FourSure, a Peer-to-Peer Trust App
Products and Releases  |  5/13/2015  | 
The FourSure mobile app enables peer users to authenticate each other and protect their shared content across any social or storage network
High-Tech Bridge launches web penetration test security seal
Products and Releases  |  5/12/2015  | 
New security seal gives consumers confidence that websites have been manually tested for most complex vulnerabilities in accordance to industry standards and best-practices
Bracket Computing Announces New High-Assurance Security Capabilities for Hyperscale Clouds
Products and Releases  |  5/12/2015  | 
Bracket Security Fabric Allows Large Enterprises to Move Their Most Sensitive Workloads to the Public Cloud
Survey: Most IT Pros Dont Know Where Sensitive Company Data Resides
Products and Releases  |  5/12/2015  | 
Survey Results from RSA Conference Indicate Securing the Cloud Continues to be a Work in Progress
Enterprise IT Heads Indicate Need for Scalable, Secure Mobile App Platforms
Products and Releases  |  5/11/2015  | 
New moBack Study Finds More Than Half of Enterprises Developing Mobile and Web Applications Cite Biggest Challenge as High Costs Associated with DevOps and Infrastructure Provisioning
Free App Shows Unencrypted Data
Products and Releases  |  5/11/2015  | 
App From UNH Helps You Find Unencrypted Data Leaked From Applications on Your Phone and Computer
Online ad industry fires back against $6.3 billion fraud issue
Products and Releases  |  5/11/2015  | 
TAG Fraud Threat List Identifies Known Sources of Bot Traffic; Pilot Program Underway with Broader Deployment Expected in Q3 2015
Twistlock Unveils Virtual Container Security Suite to Keep Container-Based Apps Secure
Products and Releases  |  5/7/2015  | 
Emerging from Stealth Mode, the Company Announces $2.5 Million Funding from YL Ventures
BakerHostetler Data Security Incident Response Report Shows Human Error is More Often to Blame
Products and Releases  |  5/7/2015  | 
Findings highlight employee negligence as primary factor in majority of cases; No industry is immune; Enhanced detection capabilities critical
Troux Introduces Solutions to Combat Cybersecurity Risk
Products and Releases  |  5/7/2015  | 
Technology Lifecycle Management Shores Up Most Common Opening for Cyber Criminals
Swivel Secure Launches OneTouch Authentication
Products and Releases  |  5/7/2015  | 
Mobile app-based deployment option offers increased speed for authentication
Cybereason Closes $25 Million Series B Funding Round, Enters Strategic Partnership with Lockheed Martin
Products and Releases  |  5/6/2015  | 
Spark Capital and Lockheed Martin Join CRV; Lockheed Martin to Deploy the Cybereason Platform Across 120,000 Internal Endpoints, Integrates it into its Cyber Solution Portfolio
Browser Malware, Operational Burdens Driving Enterprises to Seek Effective Technology for Secure Web Access
Products and Releases  |  5/6/2015  | 
In New ESG Study, IT Professionals Cite Escalating Security Vulnerabilities and Operational Issues; Say Securing the Browser is an Administrative Nightmare.
Visa Launches Online Toolkit to Educate Business Owners on Benefits of Chip Technology
Products and Releases  |  5/6/2015  | 
This new resource provides tips and training for merchants seeking a seamless transition to chip-enabled card readers
Kaspersky Lab Reports Malicious Attack Increase in Q1 IT Threat Evolution Report
Products and Releases  |  5/6/2015  | 
The Company Reflects on Monumental Cyber Threat Discoveries Reported During the Quarter
NH-ISAC, THE NATIONAL HEALTH ISAC, SELECTS SOLTRA EDGE TO STANDARDIZE THREAT INTELLIGENCE PLATFORM
Products and Releases  |  5/6/2015  | 
Becomes The Second ISAC to Leverage the Solution to Strengthen Cyber Threat Intelligence Capabilities with Soltra
Issuers Forecast U.S. Shift to Chip Cards To Be Nearly Complete by 2017
Products and Releases  |  5/4/2015  | 
New Payments Security Task Force Survey Notes Accelerated Move Toward More Secure Technology
Facebook Adopts RiskIQ To Stop Malvertising
Products and Releases  |  5/4/2015  | 
Protects More than One Billion Users from Malicious Ads


New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The one you have not seen, won't be remembered".
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6495
PUBLISHED: 2018-05-23
Cross-Site Scripting (XSS) in Micro Focus Universal CMDB, version 10.20, 10.21, 10.22, 10.30, 10.31, 10.32, 10.33, 11.0, CMS, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1 and Micro Focus UCMDB Browser, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1. This vulnerability could be remotely exploited to al...
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10649
PUBLISHED: 2018-05-23
There is a Cross-Site Scripting Vulnerability in Citrix XenMobile Server 10.7 before RP3.