Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in May 2015
New ISACA Events Serve Women in Security
Products and Releases  |  5/29/2015  | 
Free Webinar in June and CSX 2015 in October
New Survey Shows Lack of Confidence in Organizations' Cyber Security
Products and Releases  |  5/29/2015  | 
New Lieberman Software survey reveals that todays complicated IT security solutions are not being properly deployed and, for most organizations, compliance trumps security
Fortinet Announces Agreement to Acquire Meru Networks
Products and Releases  |  5/28/2015  | 
Acquisition Expected to Bolster Fortinets Secure Wireless Solutions, Add Enterprise Customers, and Expand Total Addressable Market
Imperva Unveils New Cloud Architecture to Maximize Protection of Data and Applications
Products and Releases  |  5/28/2015  | 
Imperva Skyfence, Provisioned on Imperva Incapsula, Provides Superior Levels of Security, Performance and Availability
Check Point Delivers SCADA Security Solutions to Protect Industrial Control Systems against Cyber Threats
Products and Releases  |  5/26/2015  | 
New hardened security appliance with most in depth SCADA security for your Critical Infrastructure
Promisec Brings a New Weapon to Combat Cyber Attackers with Release of Promisec Endpoint Manager 4.11
Products and Releases  |  5/26/2015  | 
Combining File Integrity Monitoring and File Reputation Scoring, PEM 4.11 provides Endpoint Detection and Remediation (EDR) of Advanced Threats at Enterprise scale
Fortinet Signs Collaborative Research and Development Agreement with U.S. Department of Homeland Security
Products and Releases  |  5/26/2015  | 
Sharing of Real-Time Security Data to Strengthen Threat Intelligence for Fortinet Customers Globally
Fox-IT Launches Web and Mobile Event Analytics Platform for U.S. Financial Services Industry
Products and Releases  |  5/26/2015  | 
Company will demonstrate DetACT at the 2015 FS-ISAC and BITS Annual Summit solution showcase
Delphix Acquires Data Masking Leader, Axis Technology Software
Products and Releases  |  5/22/2015  | 
Acquisition Adds Integrated Masking to Data as a Service Platform
Logentries Launches Low-Cost Security Information and Event Management (SIEM) Service for Easy, Real-time Security Analysis
Products and Releases  |  5/22/2015  | 
Industry-standard SIEM Service Enables Customers to Easily and Cost-effectively Meet Specific Compliance Requirements
MACH37 Cyber Accelerator Accepting Applications for Fall 2015 Session
Products and Releases  |  5/22/2015  | 
Fall 15 Cohort to Begin on September 8th
Veracode Introduces IAST for Enhanced Risk Reduction in DevOps and Agile Environments
Products and Releases  |  5/22/2015  | 
Continues Strategy of Incorporating Complementary Technologies via Open and Extensible Platform
OpenDNS First to Offer Threat Intelligence Cloud Enforcement Through APIs
Products and Releases  |  5/22/2015  | 
Leading Cloud Security Company Makes API Available for Customers To Enable Advanced Enforcement of Security Threats
Research Shows Workers Ignoring Known Cyber Risks, Surfing Adult Content and Downloading Unapproved Apps
Products and Releases  |  5/19/2015  | 
Global Survey Highlights Disconnect Between Employee Awareness of Cyber Threats and Their Actions
Decline in detected malware attacks in organisations coincides perfectly with weekends.
Products and Releases  |  5/15/2015  | 
Good Morning Monday Hello Cyber Attack
SANs Survey Reveals Organizations Lack Control Over Mobile Workspaces
Products and Releases  |  5/14/2015  | 
More than 64 Percent of Mobile Workers Can Access High Value Data Remotely while One in Three Devices Are Unmanaged
CoroNet Launches Solution to Protect from Eavesdropping, Data Interception and Remote Manipulation of Devices on WiFi and Cellular Networks
Products and Releases  |  5/13/2015  | 
CoroNets Enterprise Offering Helps Carriers, MSSPs and Device Manufacturers to Protect their Customers from the Fastest-Growing Cyber Threat
Digital Guardian Acquires Savant Protection
Products and Releases  |  5/13/2015  | 
Acquisition extends the Digital Guardian Data Aware Endpoint Security Platform to fixed-function devices
Absolute Survey Shows Millennials Represent Greatest Risk to Corporate Data
Products and Releases  |  5/13/2015  | 
Absolute Software Report Uncovers Usage Behavior and Security Risks of Connected Employees
Bitdefender Rolls Out New Technology for Virtualized Infrastructure Security
Products and Releases  |  5/13/2015  | 
Bitdefender defeats long-exploited advanced threat vectors in virtualized environments
Bracket Computing Announces High-Assurance Security Capabilities for Hyperscale Clouds
Products and Releases  |  5/13/2015  | 
Bracket Security Fabric Allows Large Enterprises to Move Their Most Sensitive Workloads to the Public Cloud with Confidence
LiveEnsure Launches FourSure, a Peer-to-Peer Trust App
Products and Releases  |  5/13/2015  | 
The FourSure mobile app enables peer users to authenticate each other and protect their shared content across any social or storage network
High-Tech Bridge launches web penetration test security seal
Products and Releases  |  5/12/2015  | 
New security seal gives consumers confidence that websites have been manually tested for most complex vulnerabilities in accordance to industry standards and best-practices
Bracket Computing Announces New High-Assurance Security Capabilities for Hyperscale Clouds
Products and Releases  |  5/12/2015  | 
Bracket Security Fabric Allows Large Enterprises to Move Their Most Sensitive Workloads to the Public Cloud
Survey: Most IT Pros Dont Know Where Sensitive Company Data Resides
Products and Releases  |  5/12/2015  | 
Survey Results from RSA Conference Indicate Securing the Cloud Continues to be a Work in Progress
Enterprise IT Heads Indicate Need for Scalable, Secure Mobile App Platforms
Products and Releases  |  5/11/2015  | 
New moBack Study Finds More Than Half of Enterprises Developing Mobile and Web Applications Cite Biggest Challenge as High Costs Associated with DevOps and Infrastructure Provisioning
Free App Shows Unencrypted Data
Products and Releases  |  5/11/2015  | 
App From UNH Helps You Find Unencrypted Data Leaked From Applications on Your Phone and Computer
Online ad industry fires back against $6.3 billion fraud issue
Products and Releases  |  5/11/2015  | 
TAG Fraud Threat List Identifies Known Sources of Bot Traffic; Pilot Program Underway with Broader Deployment Expected in Q3 2015
Twistlock Unveils Virtual Container Security Suite to Keep Container-Based Apps Secure
Products and Releases  |  5/7/2015  | 
Emerging from Stealth Mode, the Company Announces $2.5 Million Funding from YL Ventures
BakerHostetler Data Security Incident Response Report Shows Human Error is More Often to Blame
Products and Releases  |  5/7/2015  | 
Findings highlight employee negligence as primary factor in majority of cases; No industry is immune; Enhanced detection capabilities critical
Troux Introduces Solutions to Combat Cybersecurity Risk
Products and Releases  |  5/7/2015  | 
Technology Lifecycle Management Shores Up Most Common Opening for Cyber Criminals
Swivel Secure Launches OneTouch Authentication
Products and Releases  |  5/7/2015  | 
Mobile app-based deployment option offers increased speed for authentication
Cybereason Closes $25 Million Series B Funding Round, Enters Strategic Partnership with Lockheed Martin
Products and Releases  |  5/6/2015  | 
Spark Capital and Lockheed Martin Join CRV; Lockheed Martin to Deploy the Cybereason Platform Across 120,000 Internal Endpoints, Integrates it into its Cyber Solution Portfolio
Browser Malware, Operational Burdens Driving Enterprises to Seek Effective Technology for Secure Web Access
Products and Releases  |  5/6/2015  | 
In New ESG Study, IT Professionals Cite Escalating Security Vulnerabilities and Operational Issues; Say Securing the Browser is an Administrative Nightmare.
Visa Launches Online Toolkit to Educate Business Owners on Benefits of Chip Technology
Products and Releases  |  5/6/2015  | 
This new resource provides tips and training for merchants seeking a seamless transition to chip-enabled card readers
Kaspersky Lab Reports Malicious Attack Increase in Q1 IT Threat Evolution Report
Products and Releases  |  5/6/2015  | 
The Company Reflects on Monumental Cyber Threat Discoveries Reported During the Quarter
Products and Releases  |  5/6/2015  | 
Becomes The Second ISAC to Leverage the Solution to Strengthen Cyber Threat Intelligence Capabilities with Soltra
Issuers Forecast U.S. Shift to Chip Cards To Be Nearly Complete by 2017
Products and Releases  |  5/4/2015  | 
New Payments Security Task Force Survey Notes Accelerated Move Toward More Secure Technology
Facebook Adopts RiskIQ To Stop Malvertising
Products and Releases  |  5/4/2015  | 
Protects More than One Billion Users from Malicious Ads

Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-11
An issue was discovered in the BSON ObjectID (aka bson-objectid) package 1.3.0 for Node.js. ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to the user-input, because bson-objectid will return early if it detects _bsontype==ObjectID in the user-inpu...
PUBLISHED: 2019-12-11
An issue was discovered in Squiz Matrix CMS 5.5.0 prior to, 5.5.1 prior to, 5.5.2 prior to, and 5.5.3 prior to where a user can trigger arbitrary unserialization of a PHP object from a packages/cms/page_templates/page_remote_content/page_remote_content.inc POST parame...
PUBLISHED: 2019-12-11
An issue was discovered in core/assets/form/form_question_types/form_question_type_file_upload/form_question_type_file_upload.inc in Squiz Matrix CMS 5.5.0 prior to, 5.5.1 prior to, 5.5.2 prior to, and 5.5.3 prior to where a user can delete arbitrary files from the se...
PUBLISHED: 2019-12-11
SQL injection vulnerability in DBD::PgPP 0.05 and earlier
PUBLISHED: 2019-12-11
includes/libs/IEUrlExtension.php in the MediaWiki API in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 does not properly detect extensions when there are an even number of "." (period) characters in a string, which allows remote attackers to conduct cross-s...