Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in July 2015
Page 1 / 2   >   >>
Google Ventures-backed Rocana Launches "Rocana Ops"
Products and Releases  |  7/31/2015  | 
Rocana Ops Is the First Product to Market Using Big Data and Advanced Analytics to Address $20 Billion Dollar IT Operations Management Market
Comilion Makes Secure and Private Cyber Security Collaboration between Enterprises Possible
Products and Releases  |  7/31/2015  | 
The company announces the definitive secured collaboration platform between companies
Nearly 80 Percent Of Consumers Think Vehicle Hacking Will Be Frequent Problem In Near Future, According To New Kelley Blue Book Survey
Products and Releases  |  7/31/2015  | 
Almost Half Will Consider News of Recent Vehicle Hacking Incident When Buying/Leasing Next Car; Domestic Auto Manufacturers Deemed Most Susceptible to Vehicle Hacking
Shellshock Activity Still Tracked to 138 Countries in Solutionary Q2 2015 SERT Threat Report
Products and Releases  |  7/31/2015  | 
U.S. and China Lead Top Sources of Command and Control Traffic; 48 Percent of Top 25 Hostile Non-U.S. IP Addresses Are "Bruteforce" Repeat Offenders
Blue Coat Acquires Perspecsys
Products and Releases  |  7/30/2015  | 
Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data compliance requirements & regional sovereigntyregulations
Most Major Financial Hacks Completely Covered Up
Products and Releases  |  7/30/2015  | 
Lieberman Software survey reveals most companies are persistently targeted by cyber attacks and the public only finds out about a small portion of security breaches
BISHOP FOX TO SPEAK AT BLACK HAT, DEF CON, AND BSIDES LAS VEGAS
Products and Releases  |  7/29/2015  | 
Security researchers will release groundbreaking vulnerabilities and cutting-edge RFID hacking methods
IOActive Turns Las Vegas into a Smart City during Black Hat and DEF CON
Products and Releases  |  7/29/2015  | 
Company to showcase series of research centered on math, physics, advanced technology, and SCADA
Accenture Survey: Companies Faced With Cyberattacks Daily Are Not Prepared
Products and Releases  |  7/29/2015  | 
Nearly two-thirds of C-suite executives surveyed indicate that cyberattacks occur daily or weekly.
OWASP Announces Final Agenda and Lightning Trainings for AppSec USA 2015 Conference
Products and Releases  |  7/28/2015  | 
Facebook CSO, Microsoft MVP and Department of Homeland Security Chief Cybersecurity Officer Join AppSec Experts to Discuss Current Threat Landscape
CYREN Unveils First Mass-Scale Sandbox Service
Products and Releases  |  7/28/2015  | 
Company introduces next generation of sandbox technology with automated logic and a global cloud infrastructure
Icon Labs Releases Security Management System
Products and Releases  |  7/28/2015  | 
Icon Labs’ Floodgate Security Manager provides security management for Internet of Things (IoT), Industrial Control, Medical, Smart Grid and DoD Devices. New Security Management System provides security management that scales to IoT edge devices, including mobile, wireless, battery powered and mesh-based IoT sensors.
Farsight Security To Relaunch Security Information Exchange at Black Hat USA
Products and Releases  |  7/28/2015  | 
2015 World’s Largest, Real-Time Threat Intelligence Information Technology Platform Offers Four New Technologies To Provide Unprecedented Visibility on Changing Internet
PwC Germany and Imperva to Deliver New Cyber Security Solution
Products and Releases  |  7/28/2015  | 
PwC all4cloud Offering to Leverage Imperva Incapsula and Imperva Skyfence to Protect Cloud-Based Applications
Next Generation of Comodo’s Enterprise Endpoint Security Solution Now Available
Products and Releases  |  7/28/2015  | 
Automatic Containment Technology at the Heart of Comodo ESM 3.4 to Keep Customers Protected From Known and Unknown Threats
Balabit launches eCSI Hacker Playground Competition for Black Hat USA 2015
Products and Releases  |  7/23/2015  | 
Top International Security Provider Teams With Silent Signal to Sponsor Hacker Challenge With Prizes of a Ticket to BlackHat Europe 2015, MacBook Air, Lego Mindstorms and More
OpenDNS Delivers New Release of ‘Investigate’ Threat Intelligence Product
Products and Releases  |  7/23/2015  | 
OpenDNS’s security search engine makes threat intelligence both interactive and actionable with access to contextual data
Fortscale Enhances Insider Threat Offering
Products and Releases  |  7/22/2015  | 
Operational Workflow Integration, Enhanced Behavior Analytics and Rapid Response Toolbox Among New Features in Version 1.4 that Cuts Response Time By Up to 30 Percent
Security Mentor Expands Gamification Experience Encouraging Greater Employee Participation and Engagement
Products and Releases  |  7/22/2015  | 
Security Awareness Training Leader Adds New Game-Based Learning Capabilities Increasing Engagement and Propelling Program Success
RSA Debuts New Lifecycle and Governance Identity Solution
Products and Releases  |  7/22/2015  | 
New Capabilities Speed Detection of Unauthorized Privilege Escalation and Remediation of Account Compromise
Spikes Security Names Industry Veteran Michael Mansouri President and COO
Products and Releases  |  7/22/2015  | 
Successful Serial Entrepreneur and Technology Visionary Brings 30 Years of Leadership Experience in Global High Tech Businesses to Security Start-Up
Symantec to Deliver Keynote at GlobalPlatform’s Annual TEE Conference
Products and Releases  |  7/22/2015  | 
Agenda will address the role of the TEE in securing connected devices, standardization, use cases, certification and security evaluation
Gigamon Launches Security Delivery Platform
Products and Releases  |  7/21/2015  | 
Unveils GigaSECURE® for Pervasive Visibility of Network Traffic and Delivers it to Multiple Security Devices Simultaneously without Impacting Network Availability
Pitney Bowes Announces Communications Hub For SMBs
Products and Releases  |  7/21/2015  | 
Metascan Now Supports Linux With Enhanced Security And Scalability
Products and Releases  |  7/21/2015  | 
OPSWAT adds support for Linux to their Multi Anti-Malware Scanner Metascan to provide enhanced security, scalability, and usability.
Ziften Rolls Out Next-Gen Endpoint Solution
Products and Releases  |  7/21/2015  | 
Ziften’s Next-gen Endpoint Security Solution Deploys in Minutes to Immediately Discover, Analyze, and Seal Security Exposures Where Businesses are Most Vulnerable
Pulse Secure Unveils Next Generation Platform to Power Mobile Access to Datacenter Applications and Cloud Services
Products and Releases  |  7/21/2015  | 
High Performance Pulse Secure Appliance with Centralized Management Provides Breakthrough Performance with Operational Scale and Simplicity
IT Decision Makers Cite Lack of Time, Deployment Expertise as Top Obstacles to EMV Readiness
Products and Releases  |  7/21/2015  | 
New Randstad Technologies’ Survey Finds 40 Percent of Businesses Won’t Meet October Liability Shift Deadline
KnowBe4 Automates Security Awareness Training for IT
Products and Releases  |  7/20/2015  | 
Most requested feature added to Kevin Mitnick Security Awareness Training
Rook Security Collaborates With FBI Indianapolis Cyber Task Force On Threat Intelligence To Reduce Impact Of Hacking Team Breach
Products and Releases  |  7/17/2015  | 
Indianapolis Security Firm Takes Industry Lead with Comprehensive Analysis of Breached Weaponizable Files; Releases Free Automated Detection Tool to Help Companies Know if They are Affected
Verizon Unveils New Managed Service
Products and Releases  |  7/17/2015  | 
Proactive Privacy Practices Can Mitigate Damage from Data Breach
Products and Releases  |  7/16/2015  | 
TRUSTe expands privacy solutions to help companies minimize potential damages with data breach response plan
SMBs at Risk of Data Privacy Threats
Products and Releases  |  7/15/2015  | 
Nominations Announced for Women in Security Awards 2015
Products and Releases  |  7/15/2015  | 
Duo Security Presents its First Annual Women in Security Awards
CounterTack Acquires ManTech Cyber Solutions International to Deliver Endpoint Detection and Response Capabilities
Products and Releases  |  7/15/2015  | 
Acquisition Supports Aggressive Go-to-Market Expansion to Surpass its 200+ Customers by Combining Real-Time Behavioral Threat Detection with In-Memory Endpoint Threat Analysis
IKANOW Optimizes Enterprise Security with Updated Analytics Platform
Products and Releases  |  7/15/2015  | 
Adds Scalability, Flexibility, Performance; Combines SIEM and Threat Intelligence Data with Customized, Robust Analytics
IOActive Joins the Institute for Critical Infrastructure Technology
Products and Releases  |  7/15/2015  | 
Company’s ‘Smart Cities’ research to be used to educate U.S. Senate and U.S. House of Representatives on security issues
Malwarebytes Releases Mac Product and Acquires AdwareMedic Giving Mac Users Malware Detection and Removal Capabilities
Products and Releases  |  7/15/2015  | 
Release of Malwarebytes Anti-Malware for Mac brings powerful security layer to Mac users; Acquisition to build on current OS X protection capabilities
ThreatConnect Debuts New TC Exchange Offering
Products and Releases  |  7/15/2015  | 
Leveraging a True Threat Intelligence Platform, Organizations Now Have Ability to Build, Host and Exchange Customized Secure Applications for Improved Intel Gathering
Vietnamese National Sentenced to 13 Years in Prison for Operating a Massive International Hacking and Identity Theft Scheme
Products and Releases  |  7/14/2015  | 
Hieu Minh Ngo stole and sold personally identifiable information on approximately 200 million U.S. citizens.
Vectra Networks Discovers High Severity Internet Explorer 11 Vulnerability Following Hacking Team Cyber Attack
Products and Releases  |  7/14/2015  | 
Vectra Threat Lab Finds Exploitable Use-After-Free Vulnerability that Can Let Attackers Bypass Standard Memory Protections in Popular Web Browser
Verint Enhances Its Identity Authentication Offering
Products and Releases  |  7/14/2015  | 
Solution Advancements Enable a More Efficient Approach to Identity Authentication to Help Safeguard Customers, Save Time and Reduce Interaction Costs
Corero Network Security Survey Finds Degradation of Customer Confidence and Lost Revenues are the Most Damaging Ramifications of DDoS Attacks
Products and Releases  |  7/14/2015  | 
Study Highlights the Effects of DDoS Attacks and How Businesses are Addressing the Threat Today
Wombat Security Expands Security Awareness Training Capabilities with Bit9 + Carbon Black Partnership
Products and Releases  |  7/13/2015  | 
New Technology Partnership Enables Businesses to Sense and Interrupt Risky Employee Behavior With "Just-in-Time" Training to Lower Cyber Security Vulnerabilities
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.