Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2015
Page 1 / 2   >   >>
Spikes Security Introduces Isla, Web Malware Isolation System
Products and Releases  |  6/30/2015  | 
Isla Appliances Work Transparently With All Modern Browsers, Securing Local and Remote Users on All Platforms, Including Windows, OSX, Linux, Android, iOS, and Blackberry
Startup Virtru Supporting Sensitive Work of Nonprofits
Products and Releases  |  6/29/2015  | 
Secure, End-to-End Email Encryption Provides Nonprofits With the Ability to Share Sensitive Information, Fostering Collaboration, Convenience and Compliance
HONEYWELL & INTEL TEAM UP ON CRITICAL INFRASTRUCTURE & INDUSTRIAL IOT
Products and Releases  |  6/26/2015  | 
Intel Security Technologies to be Included in Honeywell’s Industrial Cyber Security Solutions for Process Control
Waratek Makes Apps Self-Testing and Self-Protecting
Products and Releases  |  6/26/2015  | 
AppSecurity for Java Product Uses Outputs from Leading Application Security Testing Tools to Virtually Patch Flaws without Any Code Changes
Survey Shows Insider Threats on the Rise: Organizations Experience an Average of 3.8 Attacks per Year
Products and Releases  |  6/26/2015  | 
Survey by Crowd Research Partners Shows Endpoints Are by Far the Most Common Launch Point for an Insider Attack; Highlights Need for Robust Endpoint Security and Policies
Tanium Unveils New Forensics Capability For Incident Response
Products and Releases  |  6/26/2015  | 
New innovation within industry-leading platform dramatically accelerates investigations across millions of endpoints in seconds; only platform to bridge Security and IT Operations for closed-loop endpoint security
CENTRI Joins Cloud Security Alliance
Products and Releases  |  6/26/2015  | 
Data Security Software Provider to Contribute Expertise on Data Encryption and Optimization with CSA Activities
Survey: Most Enterprises Don't Fix 60 Percent of Security Vulnerabilities
Products and Releases  |  6/26/2015  | 
More than half take three Months to remediate flaws, according to a joint survey by Waratek at Gartner Security and Risk Management Summit
Survey: 86 Percent of Energy Security Professionals Believe They Can Detect a Breach on Critical Systems in Less Than One Week
Products and Releases  |  6/26/2015  | 
Tripwire survey compares cybersecurity views of 400 energy executives and IT professionals
Most Enterprises Do Not Fix 60 Percent of Security Vulnerabilities they Discover
Products and Releases  |  6/26/2015  | 
More than half take Three Months or More to Remediate Flaws According to Survey Conducted by Waratek at Gartner Security and Risk Management Summit
Skyhigh Cloud Report: Average Healthcare Organization Uploads 6.8 TB of Data Per Month
Products and Releases  |  6/26/2015  | 
Analysis is Based on Actual Usage Data for Over 1.6 Million Employees at Healthcare Providers and Payers
Fidelis Cybersecurity Survey Shows Lack of Trust, Limited Visibility and Knowledge Gap between the Board and IT Security Professionals
Products and Releases  |  6/25/2015  | 
New survey from Ponemon Institute and Fidelis underscores how the divide adds risk against advanced threats
HackerOne Raises $25 Million to Make the Internet Safer
Products and Releases  |  6/24/2015  | 
New Enterprise Associates leads Series B financing with participation from existing investors including Benchmark and additional investment from Yuri Milner, Marc Benioff, Drew Houston and Jeremy Stoppelman
Zscaler Announces Record Q3 Growth
Products and Releases  |  6/24/2015  | 
ProtectWise Appoints Former Commander Of Army Cyber Command To Advisory Board
Products and Releases  |  6/23/2015  | 
Lieutenant General Rhett A. Hernandez, U.S. Army (Retired) Named Company's First Strategic Advisor
Pulse Secure Appoints Sudhakar Ramakrishna as Chief Executive Officer and Board Member
Products and Releases  |  6/23/2015  | 
Former Citrix SVP and GM Brings Nearly 25 Years of Strategy, Business Management and Team Building Experience
Moving Towards Secure PHI In The Cloud, Prescription Savings Company Adopts Managed Encryption Services
Products and Releases  |  6/23/2015  | 
Rx Savings Solutions blends FireHost’s secure managed cloud and encryption service based on Vormetric technology to protect ePHI, comply with HIPAA
DigiCert Acquires Verizon Enterprise SSL Business
Products and Releases  |  6/23/2015  | 
Growing roster of enterprises to benefit from industry-leading certificate management services; Verizon to continue to offer SSL Certificates as DigiCert reseller
SRI International Releases New Game for DARPA Crowd-Sourced Software Verification Program
Products and Releases  |  6/23/2015  | 
Citizen scientists interested in cybersecurity can now play Binary Fission at www.verigames.com
Malwarebytes Acquires Junkware Removal Tool
Products and Releases  |  6/22/2015  | 
Acquisition of popular security tool reinforces Malwarebytes’ commitment to fighting against potentially unwanted programs (PUPs)
MAKING HACKERS OBSOLETE BY MAKING DATA INACCESSIBLE
Products and Releases  |  6/19/2015  | 
Cybersecurity Firm Provides Retroactive Security by Removing Access to Email and Files Even after They Have Left a Company’s Network
Vera Secures Files with Microsoft Office 365
Products and Releases  |  6/19/2015  | 
Create Documents with Office 365, Store in OneDrive, Dropbox, or Box, and Secure with Vera Strong Encryption, Granular Access Policies, and a Built-In Kill Switch for All Office Files No Matter Where They Are Stored
Latest Research Highlights Growing Insider Threat in Cybersecurity Landscape
Products and Releases  |  6/19/2015  | 
The Insider Threat Spotlight Report, sponsored by Watchful Software, calls attention to major threat/risk vector and potential lack of preparedness for data breach.
EiQ Networks Leverages Critical Security Controls to Deliver Proactive Compliance Management
Products and Releases  |  6/19/2015  | 
First Solution to Map SANS Critical Security Controls to Compliance Frameworks for Improved Security
Pindrop Security Reveals Financial and Retail Institution Call Centers See 30 Percent Rise in Phone Fraud
Products and Releases  |  6/17/2015  | 
Consumers receiving more than 86.2 million phone scam calls per month in U.S.
Cyber-Security Startup Ensilo Announces $10m Funding For Preventing Threat Actors From Extracting Key Data In Real-Time
Products and Releases  |  6/15/2015  | 
Series A Funding from Lightspeed Venture Partners and Carmel Ventures Will Enable enSilo’s Data-Exfiltration Prevention Approach to Expand in the US Market
Fastly Adds Key Enterprise Security Leadership
Products and Releases  |  6/15/2015  | 
Window Snyder, Security Veteran of Apple, Mozilla, and Microsoft, Joins Growing Cloud Infrastructure Company
Acuant Survey: Companies Look to the Cloud for Better Information Capture, Verification and Collaboration
Products and Releases  |  6/15/2015  | 
Identity verification lags even as 84% consider it ‘critical’ or ‘very important’ in the card scanning process
vArmour Offers New vArmour DSS-VFree, Downloadable Application-Level Visibility Solution
Products and Releases  |  6/10/2015  | 
vArmour empowers IT professionals to visualize complex applications in virtual and cloud environments
Dataguise Introduces Big Data Security Suite for On-Premise and Cloud Deployments
Products and Releases  |  6/9/2015  | 
Company Delivers DgSecure 5.0 to Provide Insight and Access to Different Sensitive Data Classifications
EY escalates battle against cybercrime with launch of managed security operations center
Products and Releases  |  6/9/2015  | 
 EY to invest more than US$20m in its Managed Security Operations Center, increasing its cybersecurity workforce six-fold by 2020  New Center to use advanced analytics to predict and prevent future cyber threats
New Study Shows How Strategic, Or Not, Security Is To Chief Execs
Products and Releases  |  6/9/2015  | 
While most C-Level executives are sure their infrastructure is safe, many more admit that better security will only come with enhanced visibility into the network
Entrust Datacard Integrates with Citrix Mobility Solution to Empower Mobile
Products and Releases  |  6/9/2015  | 
Integration between Entrust IdentityGuard authentication and credential management capabilities with XenMobile enable secure anytime-anywhere productivity for the mobile workforce
Tenable Extends Capabilities to Assure Security Across Complex IT Environments
Products and Releases  |  6/9/2015  | 
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets.
Tenable Network Security Extends Capabilities of Nessus Agents
Products and Releases  |  6/9/2015  | 
Additional coverage for Mac OS X and Linux helps Tenable customers further reduce the attack surface and strengthen system visibility on portable devices and other hard-to-scan assets
SOPHOS ADDS EMAIL SECURITY TO ITS CLOUD SECURITY PORTFOLIO
Products and Releases  |  6/9/2015  | 
Acquisition of Reflexion Networks delivers effective and easy-to-use email security via the cloud.
New Survey Reveals Limited Enterprise Ability to Respond to Attacks on the Trust Provided by Keys and Certificates
Products and Releases  |  6/8/2015  | 
RSA Survey of Nearly 850 IT Security Professionals Finds They Don’t Know How to Detect and Respond to Key and Certificate Vulnerabilities
Ping Identity Announces Enhanced Partner Program to Strengthen Security in a Borderless World
Products and Releases  |  6/8/2015  | 
Program Offers Partners Opportunity to Capitalize on Rapid Growth of Predicted $18 Billion Identity Access Management Market
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...