Products and Releases

Content posted in June 2014
Ohanae Introduces Cloud Privacy Protection Suite
Products and Releases  |  6/30/2014  | 
Patent pending technology ensures passwords and encryption keys are dynamically created, never stored
Blackphone Shipping Worlds First Privacy-Optimized Smartphone
Products and Releases  |  6/30/2014  | 
Handsets now shipping to customers; Web store re-opens July 14 for new orders.
Dimension Data Unveils 2014 Network Barometer Report
Products and Releases  |  6/26/2014  | 
Annual report reveals the percentage of aging and obsolete devices on corporate networks globally is at its highest in six years.
Akamai Releases First Quarter 2014 State of the Internet Report
Products and Releases  |  6/26/2014  | 
DDoS attacks decrease by 20% quarter-over-quarter, but rise 27% year-over-year
Juniper Enhances Next-Generation Firewall
Products and Releases  |  6/25/2014  | 
Enhancements to Juniper Networks(R) SRX Series Services Gateways Offer Enterprises Added Security and Control While Providing Greater Efficiency and Flexibility
Sookasa Introduces Industrys First Compliant Cloud Document Sharing through any Email Application with no Receiver Setup Required
Products and Releases  |  6/25/2014  | 
Sookasa Launches Industrys First Solution for Sharing Files Encrypted on Public Cloud Services Using Secure File Links; Adds Support for Dropbox Encryption on Android Devices for BYOD Initiatives.
Dominican National Admits Role In $65 Million Stolen Identity Income Tax Refund Fraud Scheme
Products and Releases  |  6/25/2014  | 
More than 8,000 fraudulent U.S. income tax returns to be filed, which sought more than $65 million in tax refunds.
ISA Praises DHS For Progress On Assessing NIST And Promoting Incentives
Products and Releases  |  6/25/2014  | 
Thumbs up to Obama administration for forgoing new regulations for cyber security.
BeyondTrust Offers Free App for Mobile Vuln Management
Products and Releases  |  6/25/2014  | 
New version of Retina CS for Mobile features automated, cloud-based vulnerability signature updates for Android devices
Agiliance NIST Cybersecurity Content Pack Lowers Breach Risk
Products and Releases  |  6/25/2014  | 
Packaged Intelligence in RiskVision Platform Automates Organizational Assessments and Continuous Management of Cyber Security Risks
CyberSponse, Inc. Announces CyberSponse IR360 -- Tier 4-Compliant Cybersecurity Incident Response Platform
Products and Releases  |  6/24/2014  | 
Workflow automation, command and control gives corporate incident response teams the power to manage risk, protect valuable assets, and reduce costs & risk associated with enterprise security operations
Economic espionage reckless threat to global economy not just individual states, says CIGI report
Products and Releases  |  6/24/2014  | 
Centre for International Governance Innovation (CIGI)report released.
Zix Encryption Network Protects Every Email between Its Members
Products and Releases  |  6/24/2014  | 
Businesses address data security threat in email without impacting workflow for employees or partner organizations
LightCyber announces partnership with Check Point
Products and Releases  |  6/24/2014  | 
LightCyber Magna Expands Its Advanced Breach Detection to Mitigate and Contain Attacks Using Industry-leading Check Point Firewall Software Blade.
Vorstack Automates Security Operations
Products and Releases  |  6/23/2014  | 
Latest Release of Vorstack Automation and Collaboration Platform 3.0 Helps Enterprises Reduce Time & Complexity in Identifying Security Risks
40% of Asian companies report significant economic loss from data breaches
Products and Releases  |  6/23/2014  | 
40% say they have suffered significant economic loss as a result of data breaches
Network Box USA Rolls Out Managed Hosted Email Security Solution
Products and Releases  |  6/23/2014  | 
MSSP Launches The Next Evolution Of Its Cloud Security Platform
Privilege Management Provides Defense Against Land-and-Expand Cyber Attacks
Products and Releases  |  6/23/2014  | 
Lieberman Software Explains How Advanced Persistent Threats (APTs) Are Almost Impossible to Stop, But Damage Can be Limited with Privilege Management and Secure Network Design
A.G. Schneiderman And D.A. Gascn Announce That Google And Microsoft Will Include A Smartphone Kill Switch In Next Operating Systems
Products and Releases  |  6/20/2014  | 
Inaugural Report Also Reveals New Data Showing That Thefts Fell Drastically Following Apples Introduction Of A Kill Switch
Center for Internet Security Releases 2013 Annual Report and Outlook for 2014
Products and Releases  |  6/20/2014  | 
The nonprofit organization dedicated to enhancing cyber security announces key successes from 2013 and initiatives for 2014
Bromium Research Reveals Insecurity in Existing Endpoint Protection Deployments
Products and Releases  |  6/19/2014  | 
Survey of 300 information security practitioners highlights challenges securing end users
New Study of Tech Policy Landscape Shows Privacy, Security Most Likely to Drive Consumer Action
Products and Releases  |  6/18/2014  | 
Edelman Berland survey explores issues, actions, attitudes of major technology policy issues being debated inside the Beltway
Intellinx 5.1 Fraud Management Platform Integrates with HADOOP for Improved Cybersecurity
Products and Releases  |  6/18/2014  | 
Fraud Detection Solution Utilizes Big Data to Expose Malware Attacks in Real Time
ThreatTrack Security Rolls Out ThreatSecure
Products and Releases  |  6/17/2014  | 
Venture-backed cybersecurity firm introduces ThreatSecure, a disruptive threat detection and remediation technology, and announces plans to expand into Silicon Valley
Black Lotus Communications Launches New Scrubbing Centers
Products and Releases  |  6/17/2014  | 
New Facilities, Increased DDoS Mitigation Capacity Lead to Enhanced Security Solutions for Global Customers
Voltage Introduces Encryption/Tokenization for Testing/Development
Products and Releases  |  6/13/2014  | 
Industry standards-based, Format-preserving Encryption and Tokenization Ensures Maximum Data Protection
Malwarebytes Anti-Exploit launches to protect businesses and consumers from the growing exploit threat
Products and Releases  |  6/12/2014  | 
New technology uses three layers of defense to prevent exploits targeting everyday applications and defeating security software to conduct cyber-espionage and carry out large-scale data theft.
Bridging The Cybersecurity Talent Gap
Products and Releases  |  6/12/2014  | 
Virtual Career Fair Brings Together Top Cyber Jobseekers & Employers
Waratek Protects Enterprise Java Apps from the Inside Out
Products and Releases  |  6/11/2014  | 
Run-Time Self Protection Provides Visibility, Blocking and Virtual Patching Against Threats at Every Layer of the Application Stack
Exabeam Secures $10 Million in Series A Round From Norwest Venture Partners and Aspect Ventures
Products and Releases  |  6/11/2014  | 
Matthew Howard, Theresia Gouw invest in the future of security analytics, join board of directors
First Data and Trustwave Bring New Level of Data Security to Small and Mid-Sized Businesses
Products and Releases  |  6/11/2014  | 
Companies Partner to Help Businesses Go Beyond PCI DSS Compliance with Stronger, Multi-layer Information Security Solutions Delivered through the Cloud
Diego Navarrete, New Panda Security CEO
Products and Releases  |  6/11/2014  | 
Former director of IBMs Security Systems Division in Europe takes the helm at Panda.
Most People Have Not Protected Themselves Against Fraud Since Target Breach
Products and Releases  |  6/5/2014  | 
'Shocking Lack of Concern' About Cyber Security Issues, New idRADAR Survey Reports.
RiskIQ Raises $25M to Meet Accelerating Demand for Web and Mobile Risk and Malware Detection Service
Products and Releases  |  6/5/2014  | 
Investors Back Unique Approach Used by Financial Institutions and Internet Companies to Address Digital Assets being used to Attack Customers
1st-of-Its-Kind Study Quantifies Cost of a Cloud Data Breach
Products and Releases  |  6/5/2014  | 
IT Estimates Increased Use of Cloud Services Can Triple the Probability of a $20M Data Breach.
Cloudera Strengthens Hadoop Security With Acquisition of Gazzang
Products and Releases  |  6/3/2014  | 
Combines Apache Sentry and Intel's Project Rhino With Gazzang's Encryption and Key Management to Build the Industry's Most Robust End-to-End Security Offering for Hadoop Environments
PandaLabs Quarterly Report: Q1 2014
Products and Releases  |  6/3/2014  | 
Malware creation breaks all records in the first quarter of 2014, with 160,000 new samples every day


12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15378
PUBLISHED: 2018-10-15
A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the “unmew11()?? function (libclamav/mew.c), which can be exploited to trigger an inval...
CVE-2018-18073
PUBLISHED: 2018-10-15
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
CVE-2018-15593
PUBLISHED: 2018-10-15
An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can decrypt the encrypted datastore or relay server password by leveraging an unspecified attack vector.
CVE-2018-17961
PUBLISHED: 2018-10-15
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
CVE-2018-15591
PUBLISHED: 2018-10-15
An issue was discovered in Ivanti Workspace Control before 10.3.10.0 and RES One Workspace. A local authenticated user can bypass Application Whitelisting restrictions to execute arbitrary code by leveraging multiple unspecified attack vectors.