Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2015
Page 1 / 2   >   >>
Spikes Security Introduces Isla, Web Malware Isolation System
Products and Releases  |  6/30/2015  | 
Isla Appliances Work Transparently With All Modern Browsers, Securing Local and Remote Users on All Platforms, Including Windows, OSX, Linux, Android, iOS, and Blackberry
Startup Virtru Supporting Sensitive Work of Nonprofits
Products and Releases  |  6/29/2015  | 
Secure, End-to-End Email Encryption Provides Nonprofits With the Ability to Share Sensitive Information, Fostering Collaboration, Convenience and Compliance
Products and Releases  |  6/26/2015  | 
Intel Security Technologies to be Included in Honeywells Industrial Cyber Security Solutions for Process Control
Waratek Makes Apps Self-Testing and Self-Protecting
Products and Releases  |  6/26/2015  | 
AppSecurity for Java Product Uses Outputs from Leading Application Security Testing Tools to Virtually Patch Flaws without Any Code Changes
Survey Shows Insider Threats on the Rise: Organizations Experience an Average of 3.8 Attacks per Year
Products and Releases  |  6/26/2015  | 
Survey by Crowd Research Partners Shows Endpoints Are by Far the Most Common Launch Point for an Insider Attack; Highlights Need for Robust Endpoint Security and Policies
Tanium Unveils New Forensics Capability For Incident Response
Products and Releases  |  6/26/2015  | 
New innovation within industry-leading platform dramatically accelerates investigations across millions of endpoints in seconds; only platform to bridge Security and IT Operations for closed-loop endpoint security
CENTRI Joins Cloud Security Alliance
Products and Releases  |  6/26/2015  | 
Data Security Software Provider to Contribute Expertise on Data Encryption and Optimization with CSA Activities
Survey: Most Enterprises Don't Fix 60 Percent of Security Vulnerabilities
Products and Releases  |  6/26/2015  | 
More than half take three Months to remediate flaws, according to a joint survey by Waratek at Gartner Security and Risk Management Summit
Survey: 86 Percent of Energy Security Professionals Believe They Can Detect a Breach on Critical Systems in Less Than One Week
Products and Releases  |  6/26/2015  | 
Tripwire survey compares cybersecurity views of 400 energy executives and IT professionals
Most Enterprises Do Not Fix 60 Percent of Security Vulnerabilities they Discover
Products and Releases  |  6/26/2015  | 
More than half take Three Months or More to Remediate Flaws According to Survey Conducted by Waratek at Gartner Security and Risk Management Summit
Skyhigh Cloud Report: Average Healthcare Organization Uploads 6.8 TB of Data Per Month
Products and Releases  |  6/26/2015  | 
Analysis is Based on Actual Usage Data for Over 1.6 Million Employees at Healthcare Providers and Payers
Fidelis Cybersecurity Survey Shows Lack of Trust, Limited Visibility and Knowledge Gap between the Board and IT Security Professionals
Products and Releases  |  6/25/2015  | 
New survey from Ponemon Institute and Fidelis underscores how the divide adds risk against advanced threats
HackerOne Raises $25 Million to Make the Internet Safer
Products and Releases  |  6/24/2015  | 
New Enterprise Associates leads Series B financing with participation from existing investors including Benchmark and additional investment from Yuri Milner, Marc Benioff, Drew Houston and Jeremy Stoppelman
Zscaler Announces Record Q3 Growth
Products and Releases  |  6/24/2015  | 
ProtectWise Appoints Former Commander Of Army Cyber Command To Advisory Board
Products and Releases  |  6/23/2015  | 
Lieutenant General Rhett A. Hernandez, U.S. Army (Retired) Named Company's First Strategic Advisor
Pulse Secure Appoints Sudhakar Ramakrishna as Chief Executive Officer and Board Member
Products and Releases  |  6/23/2015  | 
Former Citrix SVP and GM Brings Nearly 25 Years of Strategy, Business Management and Team Building Experience
Moving Towards Secure PHI In The Cloud, Prescription Savings Company Adopts Managed Encryption Services
Products and Releases  |  6/23/2015  | 
Rx Savings Solutions blends FireHosts secure managed cloud and encryption service based on Vormetric technology to protect ePHI, comply with HIPAA
DigiCert Acquires Verizon Enterprise SSL Business
Products and Releases  |  6/23/2015  | 
Growing roster of enterprises to benefit from industry-leading certificate management services; Verizon to continue to offer SSL Certificates as DigiCert reseller
SRI International Releases New Game for DARPA Crowd-Sourced Software Verification Program
Products and Releases  |  6/23/2015  | 
Citizen scientists interested in cybersecurity can now play Binary Fission at www.verigames.com
Malwarebytes Acquires Junkware Removal Tool
Products and Releases  |  6/22/2015  | 
Acquisition of popular security tool reinforces Malwarebytes commitment to fighting against potentially unwanted programs (PUPs)
Products and Releases  |  6/19/2015  | 
Cybersecurity Firm Provides Retroactive Security by Removing Access to Email and Files Even after They Have Left a Companys Network
Vera Secures Files with Microsoft Office 365
Products and Releases  |  6/19/2015  | 
Create Documents with Office 365, Store in OneDrive, Dropbox, or Box, and Secure with Vera Strong Encryption, Granular Access Policies, and a Built-In Kill Switch for All Office Files No Matter Where They Are Stored
Latest Research Highlights Growing Insider Threat in Cybersecurity Landscape
Products and Releases  |  6/19/2015  | 
The Insider Threat Spotlight Report, sponsored by Watchful Software, calls attention to major threat/risk vector and potential lack of preparedness for data breach.
EiQ Networks Leverages Critical Security Controls to Deliver Proactive Compliance Management
Products and Releases  |  6/19/2015  | 
First Solution to Map SANS Critical Security Controls to Compliance Frameworks for Improved Security
Pindrop Security Reveals Financial and Retail Institution Call Centers See 30 Percent Rise in Phone Fraud
Products and Releases  |  6/17/2015  | 
Consumers receiving more than 86.2 million phone scam calls per month in U.S.
Cyber-Security Startup Ensilo Announces $10m Funding For Preventing Threat Actors From Extracting Key Data In Real-Time
Products and Releases  |  6/15/2015  | 
Series A Funding from Lightspeed Venture Partners and Carmel Ventures Will Enable enSilos Data-Exfiltration Prevention Approach to Expand in the US Market
Fastly Adds Key Enterprise Security Leadership
Products and Releases  |  6/15/2015  | 
Window Snyder, Security Veteran of Apple, Mozilla, and Microsoft, Joins Growing Cloud Infrastructure Company
Acuant Survey: Companies Look to the Cloud for Better Information Capture, Verification and Collaboration
Products and Releases  |  6/15/2015  | 
Identity verification lags even as 84% consider it critical or very important in the card scanning process
vArmour Offers New vArmour DSS-VFree, Downloadable Application-Level Visibility Solution
Products and Releases  |  6/10/2015  | 
vArmour empowers IT professionals to visualize complex applications in virtual and cloud environments
Dataguise Introduces Big Data Security Suite for On-Premise and Cloud Deployments
Products and Releases  |  6/9/2015  | 
Company Delivers DgSecure 5.0 to Provide Insight and Access to Different Sensitive Data Classifications
EY escalates battle against cybercrime with launch of managed security operations center
Products and Releases  |  6/9/2015  | 
 EY to invest more than US$20m in its Managed Security Operations Center, increasing its cybersecurity workforce six-fold by 2020  New Center to use advanced analytics to predict and prevent future cyber threats
New Study Shows How Strategic, Or Not, Security Is To Chief Execs
Products and Releases  |  6/9/2015  | 
While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network
Entrust Datacard Integrates with Citrix Mobility Solution to Empower Mobile
Products and Releases  |  6/9/2015  | 
Integration between Entrust IdentityGuard authentication and credential management capabilities with XenMobile enable secure anytime-anywhere productivity for the mobile workforce
Tenable Extends Capabilities to Assure Security Across Complex IT Environments
Products and Releases  |  6/9/2015  | 
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets.
Tenable Network Security Extends Capabilities of Nessus Agents
Products and Releases  |  6/9/2015  | 
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets
Products and Releases  |  6/9/2015  | 
Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.
New Survey Reveals Limited Enterprise Ability to Respond to Attacks on the Trust Provided by Keys and Certificates
Products and Releases  |  6/8/2015  | 
RSA Survey of Nearly 850 IT Security Professionals Finds They Dont Know How to Detect and Respond to Key and Certificate Vulnerabilities
Ping Identity Announces Enhanced Partner Program to Strengthen Security in a Borderless World
Products and Releases  |  6/8/2015  | 
Program Offers Partners Opportunity to Capitalize on Rapid Growth of Predicted $18 Billion Identity Access Management Market
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.