Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in May 2015
New ISACA Events Serve Women in Security
Products and Releases  |  5/29/2015  | 
Free Webinar in June and CSX 2015 in October
New Survey Shows Lack of Confidence in Organizations' Cyber Security
Products and Releases  |  5/29/2015  | 
New Lieberman Software survey reveals that todays complicated IT security solutions are not being properly deployed and, for most organizations, compliance trumps security
Fortinet Announces Agreement to Acquire Meru Networks
Products and Releases  |  5/28/2015  | 
Acquisition Expected to Bolster Fortinets Secure Wireless Solutions, Add Enterprise Customers, and Expand Total Addressable Market
Imperva Unveils New Cloud Architecture to Maximize Protection of Data and Applications
Products and Releases  |  5/28/2015  | 
Imperva Skyfence, Provisioned on Imperva Incapsula, Provides Superior Levels of Security, Performance and Availability
Check Point Delivers SCADA Security Solutions to Protect Industrial Control Systems against Cyber Threats
Products and Releases  |  5/26/2015  | 
New hardened security appliance with most in depth SCADA security for your Critical Infrastructure
Promisec Brings a New Weapon to Combat Cyber Attackers with Release of Promisec Endpoint Manager 4.11
Products and Releases  |  5/26/2015  | 
Combining File Integrity Monitoring and File Reputation Scoring, PEM 4.11 provides Endpoint Detection and Remediation (EDR) of Advanced Threats at Enterprise scale
Fortinet Signs Collaborative Research and Development Agreement with U.S. Department of Homeland Security
Products and Releases  |  5/26/2015  | 
Sharing of Real-Time Security Data to Strengthen Threat Intelligence for Fortinet Customers Globally
Fox-IT Launches Web and Mobile Event Analytics Platform for U.S. Financial Services Industry
Products and Releases  |  5/26/2015  | 
Company will demonstrate DetACT at the 2015 FS-ISAC and BITS Annual Summit solution showcase
Delphix Acquires Data Masking Leader, Axis Technology Software
Products and Releases  |  5/22/2015  | 
Acquisition Adds Integrated Masking to Data as a Service Platform
Logentries Launches Low-Cost Security Information and Event Management (SIEM) Service for Easy, Real-time Security Analysis
Products and Releases  |  5/22/2015  | 
Industry-standard SIEM Service Enables Customers to Easily and Cost-effectively Meet Specific Compliance Requirements
MACH37 Cyber Accelerator Accepting Applications for Fall 2015 Session
Products and Releases  |  5/22/2015  | 
Fall 15 Cohort to Begin on September 8th
Veracode Introduces IAST for Enhanced Risk Reduction in DevOps and Agile Environments
Products and Releases  |  5/22/2015  | 
Continues Strategy of Incorporating Complementary Technologies via Open and Extensible Platform
OpenDNS First to Offer Threat Intelligence Cloud Enforcement Through APIs
Products and Releases  |  5/22/2015  | 
Leading Cloud Security Company Makes API Available for Customers To Enable Advanced Enforcement of Security Threats
Research Shows Workers Ignoring Known Cyber Risks, Surfing Adult Content and Downloading Unapproved Apps
Products and Releases  |  5/19/2015  | 
Global Survey Highlights Disconnect Between Employee Awareness of Cyber Threats and Their Actions
Decline in detected malware attacks in organisations coincides perfectly with weekends.
Products and Releases  |  5/15/2015  | 
Good Morning Monday Hello Cyber Attack
SANs Survey Reveals Organizations Lack Control Over Mobile Workspaces
Products and Releases  |  5/14/2015  | 
More than 64 Percent of Mobile Workers Can Access High Value Data Remotely while One in Three Devices Are Unmanaged
CoroNet Launches Solution to Protect from Eavesdropping, Data Interception and Remote Manipulation of Devices on WiFi and Cellular Networks
Products and Releases  |  5/13/2015  | 
CoroNets Enterprise Offering Helps Carriers, MSSPs and Device Manufacturers to Protect their Customers from the Fastest-Growing Cyber Threat
Digital Guardian Acquires Savant Protection
Products and Releases  |  5/13/2015  | 
Acquisition extends the Digital Guardian Data Aware Endpoint Security Platform to fixed-function devices
Absolute Survey Shows Millennials Represent Greatest Risk to Corporate Data
Products and Releases  |  5/13/2015  | 
Absolute Software Report Uncovers Usage Behavior and Security Risks of Connected Employees
Bitdefender Rolls Out New Technology for Virtualized Infrastructure Security
Products and Releases  |  5/13/2015  | 
Bitdefender defeats long-exploited advanced threat vectors in virtualized environments
Bracket Computing Announces High-Assurance Security Capabilities for Hyperscale Clouds
Products and Releases  |  5/13/2015  | 
Bracket Security Fabric Allows Large Enterprises to Move Their Most Sensitive Workloads to the Public Cloud with Confidence
LiveEnsure Launches FourSure, a Peer-to-Peer Trust App
Products and Releases  |  5/13/2015  | 
The FourSure mobile app enables peer users to authenticate each other and protect their shared content across any social or storage network
High-Tech Bridge launches web penetration test security seal
Products and Releases  |  5/12/2015  | 
New security seal gives consumers confidence that websites have been manually tested for most complex vulnerabilities in accordance to industry standards and best-practices
Bracket Computing Announces New High-Assurance Security Capabilities for Hyperscale Clouds
Products and Releases  |  5/12/2015  | 
Bracket Security Fabric Allows Large Enterprises to Move Their Most Sensitive Workloads to the Public Cloud
Survey: Most IT Pros Dont Know Where Sensitive Company Data Resides
Products and Releases  |  5/12/2015  | 
Survey Results from RSA Conference Indicate Securing the Cloud Continues to be a Work in Progress
Enterprise IT Heads Indicate Need for Scalable, Secure Mobile App Platforms
Products and Releases  |  5/11/2015  | 
New moBack Study Finds More Than Half of Enterprises Developing Mobile and Web Applications Cite Biggest Challenge as High Costs Associated with DevOps and Infrastructure Provisioning
Free App Shows Unencrypted Data
Products and Releases  |  5/11/2015  | 
App From UNH Helps You Find Unencrypted Data Leaked From Applications on Your Phone and Computer
Online ad industry fires back against $6.3 billion fraud issue
Products and Releases  |  5/11/2015  | 
TAG Fraud Threat List Identifies Known Sources of Bot Traffic; Pilot Program Underway with Broader Deployment Expected in Q3 2015
Twistlock Unveils Virtual Container Security Suite to Keep Container-Based Apps Secure
Products and Releases  |  5/7/2015  | 
Emerging from Stealth Mode, the Company Announces $2.5 Million Funding from YL Ventures
BakerHostetler Data Security Incident Response Report Shows Human Error is More Often to Blame
Products and Releases  |  5/7/2015  | 
Findings highlight employee negligence as primary factor in majority of cases; No industry is immune; Enhanced detection capabilities critical
Troux Introduces Solutions to Combat Cybersecurity Risk
Products and Releases  |  5/7/2015  | 
Technology Lifecycle Management Shores Up Most Common Opening for Cyber Criminals
Swivel Secure Launches OneTouch Authentication
Products and Releases  |  5/7/2015  | 
Mobile app-based deployment option offers increased speed for authentication
Cybereason Closes $25 Million Series B Funding Round, Enters Strategic Partnership with Lockheed Martin
Products and Releases  |  5/6/2015  | 
Spark Capital and Lockheed Martin Join CRV; Lockheed Martin to Deploy the Cybereason Platform Across 120,000 Internal Endpoints, Integrates it into its Cyber Solution Portfolio
Browser Malware, Operational Burdens Driving Enterprises to Seek Effective Technology for Secure Web Access
Products and Releases  |  5/6/2015  | 
In New ESG Study, IT Professionals Cite Escalating Security Vulnerabilities and Operational Issues; Say Securing the Browser is an Administrative Nightmare.
Visa Launches Online Toolkit to Educate Business Owners on Benefits of Chip Technology
Products and Releases  |  5/6/2015  | 
This new resource provides tips and training for merchants seeking a seamless transition to chip-enabled card readers
Kaspersky Lab Reports Malicious Attack Increase in Q1 IT Threat Evolution Report
Products and Releases  |  5/6/2015  | 
The Company Reflects on Monumental Cyber Threat Discoveries Reported During the Quarter
NH-ISAC, THE NATIONAL HEALTH ISAC, SELECTS SOLTRA EDGE TO STANDARDIZE THREAT INTELLIGENCE PLATFORM
Products and Releases  |  5/6/2015  | 
Becomes The Second ISAC to Leverage the Solution to Strengthen Cyber Threat Intelligence Capabilities with Soltra
Issuers Forecast U.S. Shift to Chip Cards To Be Nearly Complete by 2017
Products and Releases  |  5/4/2015  | 
New Payments Security Task Force Survey Notes Accelerated Move Toward More Secure Technology
Facebook Adopts RiskIQ To Stop Malvertising
Products and Releases  |  5/4/2015  | 
Protects More than One Billion Users from Malicious Ads


COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.