Products and Releases

Content posted in June 2015
Page 1 / 2   >   >>
Spikes Security Introduces Isla, Web Malware Isolation System
Products and Releases  |  6/30/2015  | 
Isla Appliances Work Transparently With All Modern Browsers, Securing Local and Remote Users on All Platforms, Including Windows, OSX, Linux, Android, iOS, and Blackberry
Startup Virtru Supporting Sensitive Work of Nonprofits
Products and Releases  |  6/29/2015  | 
Secure, End-to-End Email Encryption Provides Nonprofits With the Ability to Share Sensitive Information, Fostering Collaboration, Convenience and Compliance
HONEYWELL & INTEL TEAM UP ON CRITICAL INFRASTRUCTURE & INDUSTRIAL IOT
Products and Releases  |  6/26/2015  | 
Intel Security Technologies to be Included in Honeywells Industrial Cyber Security Solutions for Process Control
Waratek Makes Apps Self-Testing and Self-Protecting
Products and Releases  |  6/26/2015  | 
AppSecurity for Java Product Uses Outputs from Leading Application Security Testing Tools to Virtually Patch Flaws without Any Code Changes
Survey Shows Insider Threats on the Rise: Organizations Experience an Average of 3.8 Attacks per Year
Products and Releases  |  6/26/2015  | 
Survey by Crowd Research Partners Shows Endpoints Are by Far the Most Common Launch Point for an Insider Attack; Highlights Need for Robust Endpoint Security and Policies
Tanium Unveils New Forensics Capability For Incident Response
Products and Releases  |  6/26/2015  | 
New innovation within industry-leading platform dramatically accelerates investigations across millions of endpoints in seconds; only platform to bridge Security and IT Operations for closed-loop endpoint security
CENTRI Joins Cloud Security Alliance
Products and Releases  |  6/26/2015  | 
Data Security Software Provider to Contribute Expertise on Data Encryption and Optimization with CSA Activities
Survey: Most Enterprises Don't Fix 60 Percent of Security Vulnerabilities
Products and Releases  |  6/26/2015  | 
More than half take three Months to remediate flaws, according to a joint survey by Waratek at Gartner Security and Risk Management Summit
Survey: 86 Percent of Energy Security Professionals Believe They Can Detect a Breach on Critical Systems in Less Than One Week
Products and Releases  |  6/26/2015  | 
Tripwire survey compares cybersecurity views of 400 energy executives and IT professionals
Most Enterprises Do Not Fix 60 Percent of Security Vulnerabilities they Discover
Products and Releases  |  6/26/2015  | 
More than half take Three Months or More to Remediate Flaws According to Survey Conducted by Waratek at Gartner Security and Risk Management Summit
Skyhigh Cloud Report: Average Healthcare Organization Uploads 6.8 TB of Data Per Month
Products and Releases  |  6/26/2015  | 
Analysis is Based on Actual Usage Data for Over 1.6 Million Employees at Healthcare Providers and Payers
Fidelis Cybersecurity Survey Shows Lack of Trust, Limited Visibility and Knowledge Gap between the Board and IT Security Professionals
Products and Releases  |  6/25/2015  | 
New survey from Ponemon Institute and Fidelis underscores how the divide adds risk against advanced threats
HackerOne Raises $25 Million to Make the Internet Safer
Products and Releases  |  6/24/2015  | 
New Enterprise Associates leads Series B financing with participation from existing investors including Benchmark and additional investment from Yuri Milner, Marc Benioff, Drew Houston and Jeremy Stoppelman
Zscaler Announces Record Q3 Growth
Products and Releases  |  6/24/2015  | 
ProtectWise Appoints Former Commander Of Army Cyber Command To Advisory Board
Products and Releases  |  6/23/2015  | 
Lieutenant General Rhett A. Hernandez, U.S. Army (Retired) Named Company's First Strategic Advisor
Pulse Secure Appoints Sudhakar Ramakrishna as Chief Executive Officer and Board Member
Products and Releases  |  6/23/2015  | 
Former Citrix SVP and GM Brings Nearly 25 Years of Strategy, Business Management and Team Building Experience
Moving Towards Secure PHI In The Cloud, Prescription Savings Company Adopts Managed Encryption Services
Products and Releases  |  6/23/2015  | 
Rx Savings Solutions blends FireHosts secure managed cloud and encryption service based on Vormetric technology to protect ePHI, comply with HIPAA
DigiCert Acquires Verizon Enterprise SSL Business
Products and Releases  |  6/23/2015  | 
Growing roster of enterprises to benefit from industry-leading certificate management services; Verizon to continue to offer SSL Certificates as DigiCert reseller
SRI International Releases New Game for DARPA Crowd-Sourced Software Verification Program
Products and Releases  |  6/23/2015  | 
Citizen scientists interested in cybersecurity can now play Binary Fission at www.verigames.com
Malwarebytes Acquires Junkware Removal Tool
Products and Releases  |  6/22/2015  | 
Acquisition of popular security tool reinforces Malwarebytes commitment to fighting against potentially unwanted programs (PUPs)
MAKING HACKERS OBSOLETE BY MAKING DATA INACCESSIBLE
Products and Releases  |  6/19/2015  | 
Cybersecurity Firm Provides Retroactive Security by Removing Access to Email and Files Even after They Have Left a Companys Network
Vera Secures Files with Microsoft Office 365
Products and Releases  |  6/19/2015  | 
Create Documents with Office 365, Store in OneDrive, Dropbox, or Box, and Secure with Vera Strong Encryption, Granular Access Policies, and a Built-In Kill Switch for All Office Files No Matter Where They Are Stored
Latest Research Highlights Growing Insider Threat in Cybersecurity Landscape
Products and Releases  |  6/19/2015  | 
The Insider Threat Spotlight Report, sponsored by Watchful Software, calls attention to major threat/risk vector and potential lack of preparedness for data breach.
EiQ Networks Leverages Critical Security Controls to Deliver Proactive Compliance Management
Products and Releases  |  6/19/2015  | 
First Solution to Map SANS Critical Security Controls to Compliance Frameworks for Improved Security
Pindrop Security Reveals Financial and Retail Institution Call Centers See 30 Percent Rise in Phone Fraud
Products and Releases  |  6/17/2015  | 
Consumers receiving more than 86.2 million phone scam calls per month in U.S.
Cyber-Security Startup Ensilo Announces $10m Funding For Preventing Threat Actors From Extracting Key Data In Real-Time
Products and Releases  |  6/15/2015  | 
Series A Funding from Lightspeed Venture Partners and Carmel Ventures Will Enable enSilos Data-Exfiltration Prevention Approach to Expand in the US Market
Fastly Adds Key Enterprise Security Leadership
Products and Releases  |  6/15/2015  | 
Window Snyder, Security Veteran of Apple, Mozilla, and Microsoft, Joins Growing Cloud Infrastructure Company
Acuant Survey: Companies Look to the Cloud for Better Information Capture, Verification and Collaboration
Products and Releases  |  6/15/2015  | 
Identity verification lags even as 84% consider it critical or very important in the card scanning process
vArmour Offers New vArmour DSS-VFree, Downloadable Application-Level Visibility Solution
Products and Releases  |  6/10/2015  | 
vArmour empowers IT professionals to visualize complex applications in virtual and cloud environments
Dataguise Introduces Big Data Security Suite for On-Premise and Cloud Deployments
Products and Releases  |  6/9/2015  | 
Company Delivers DgSecure 5.0 to Provide Insight and Access to Different Sensitive Data Classifications
EY escalates battle against cybercrime with launch of managed security operations center
Products and Releases  |  6/9/2015  | 
 EY to invest more than US$20m in its Managed Security Operations Center, increasing its cybersecurity workforce six-fold by 2020  New Center to use advanced analytics to predict and prevent future cyber threats
New Study Shows How Strategic, Or Not, Security Is To Chief Execs
Products and Releases  |  6/9/2015  | 
While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network
Entrust Datacard Integrates with Citrix Mobility Solution to Empower Mobile
Products and Releases  |  6/9/2015  | 
Integration between Entrust IdentityGuard authentication and credential management capabilities with XenMobile enable secure anytime-anywhere productivity for the mobile workforce
Tenable Extends Capabilities to Assure Security Across Complex IT Environments
Products and Releases  |  6/9/2015  | 
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets.
Tenable Network Security Extends Capabilities of Nessus Agents
Products and Releases  |  6/9/2015  | 
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets
SOPHOS ADDS EMAIL SECURITY TO ITS CLOUD SECURITY PORTFOLIO
Products and Releases  |  6/9/2015  | 
Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.
New Survey Reveals Limited Enterprise Ability to Respond to Attacks on the Trust Provided by Keys and Certificates
Products and Releases  |  6/8/2015  | 
RSA Survey of Nearly 850 IT Security Professionals Finds They Dont Know How to Detect and Respond to Key and Certificate Vulnerabilities
Ping Identity Announces Enhanced Partner Program to Strengthen Security in a Borderless World
Products and Releases  |  6/8/2015  | 
Program Offers Partners Opportunity to Capitalize on Rapid Growth of Predicted $18 Billion Identity Access Management Market
Page 1 / 2   >   >>


New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "The one you have not seen, won't be remembered".
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10428
PUBLISHED: 2018-05-23
ILIAS before 5.1.26, 5.2.x before 5.2.15, and 5.3.x before 5.3.4, due to inconsistencies in parameter handling, is vulnerable to various instances of reflected cross-site-scripting.
CVE-2018-6495
PUBLISHED: 2018-05-23
Cross-Site Scripting (XSS) in Micro Focus Universal CMDB, version 10.20, 10.21, 10.22, 10.30, 10.31, 10.32, 10.33, 11.0, CMS, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1 and Micro Focus UCMDB Browser, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1. This vulnerability could be remotely exploited to al...
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.