Products and Releases

Content posted in July 2015
Page 1 / 2   >   >>
Google Ventures-backed Rocana Launches "Rocana Ops"
Products and Releases  |  7/31/2015  | 
Rocana Ops Is the First Product to Market Using Big Data and Advanced Analytics to Address $20 Billion Dollar IT Operations Management Market
Comilion Makes Secure and Private Cyber Security Collaboration between Enterprises Possible
Products and Releases  |  7/31/2015  | 
The company announces the definitive secured collaboration platform between companies
Nearly 80 Percent Of Consumers Think Vehicle Hacking Will Be Frequent Problem In Near Future, According To New Kelley Blue Book Survey
Products and Releases  |  7/31/2015  | 
Almost Half Will Consider News of Recent Vehicle Hacking Incident When Buying/Leasing Next Car; Domestic Auto Manufacturers Deemed Most Susceptible to Vehicle Hacking
Shellshock Activity Still Tracked to 138 Countries in Solutionary Q2 2015 SERT Threat Report
Products and Releases  |  7/31/2015  | 
U.S. and China Lead Top Sources of Command and Control Traffic; 48 Percent of Top 25 Hostile Non-U.S. IP Addresses Are "Bruteforce" Repeat Offenders
Blue Coat Acquires Perspecsys
Products and Releases  |  7/30/2015  | 
Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data compliance requirements & regional sovereigntyregulations
Most Major Financial Hacks Completely Covered Up
Products and Releases  |  7/30/2015  | 
Lieberman Software survey reveals most companies are persistently targeted by cyber attacks and the public only finds out about a small portion of security breaches
BISHOP FOX TO SPEAK AT BLACK HAT, DEF CON, AND BSIDES LAS VEGAS
Products and Releases  |  7/29/2015  | 
Security researchers will release groundbreaking vulnerabilities and cutting-edge RFID hacking methods
IOActive Turns Las Vegas into a Smart City during Black Hat and DEF CON
Products and Releases  |  7/29/2015  | 
Company to showcase series of research centered on math, physics, advanced technology, and SCADA
Accenture Survey: Companies Faced With Cyberattacks Daily Are Not Prepared
Products and Releases  |  7/29/2015  | 
Nearly two-thirds of C-suite executives surveyed indicate that cyberattacks occur daily or weekly.
OWASP Announces Final Agenda and Lightning Trainings for AppSec USA 2015 Conference
Products and Releases  |  7/28/2015  | 
Facebook CSO, Microsoft MVP and Department of Homeland Security Chief Cybersecurity Officer Join AppSec Experts to Discuss Current Threat Landscape
CYREN Unveils First Mass-Scale Sandbox Service
Products and Releases  |  7/28/2015  | 
Company introduces next generation of sandbox technology with automated logic and a global cloud infrastructure
Icon Labs Releases Security Management System
Products and Releases  |  7/28/2015  | 
Icon Labs Floodgate Security Manager provides security management for Internet of Things (IoT), Industrial Control, Medical, Smart Grid and DoD Devices. New Security Management System provides security management that scales to IoT edge devices, including mobile, wireless, battery powered and mesh-based IoT sensors.
Farsight Security To Relaunch Security Information Exchange at Black Hat USA
Products and Releases  |  7/28/2015  | 
2015 Worlds Largest, Real-Time Threat Intelligence Information Technology Platform Offers Four New Technologies To Provide Unprecedented Visibility on Changing Internet
PwC Germany and Imperva to Deliver New Cyber Security Solution
Products and Releases  |  7/28/2015  | 
PwC all4cloud Offering to Leverage Imperva Incapsula and Imperva Skyfence to Protect Cloud-Based Applications
Next Generation of Comodos Enterprise Endpoint Security Solution Now Available
Products and Releases  |  7/28/2015  | 
Automatic Containment Technology at the Heart of Comodo ESM 3.4 to Keep Customers Protected From Known and Unknown Threats
Balabit launches eCSI Hacker Playground Competition for Black Hat USA 2015
Products and Releases  |  7/23/2015  | 
Top International Security Provider Teams With Silent Signal to Sponsor Hacker Challenge With Prizes of a Ticket to BlackHat Europe 2015, MacBook Air, Lego Mindstorms and More
OpenDNS Delivers New Release of Investigate Threat Intelligence Product
Products and Releases  |  7/23/2015  | 
OpenDNSs security search engine makes threat intelligence both interactive and actionable with access to contextual data
Fortscale Enhances Insider Threat Offering
Products and Releases  |  7/22/2015  | 
Operational Workflow Integration, Enhanced Behavior Analytics and Rapid Response Toolbox Among New Features in Version 1.4 that Cuts Response Time By Up to 30 Percent
Security Mentor Expands Gamification Experience Encouraging Greater Employee Participation and Engagement
Products and Releases  |  7/22/2015  | 
Security Awareness Training Leader Adds New Game-Based Learning Capabilities Increasing Engagement and Propelling Program Success
RSA Debuts New Lifecycle and Governance Identity Solution
Products and Releases  |  7/22/2015  | 
New Capabilities Speed Detection of Unauthorized Privilege Escalation and Remediation of Account Compromise
Spikes Security Names Industry Veteran Michael Mansouri President and COO
Products and Releases  |  7/22/2015  | 
Successful Serial Entrepreneur and Technology Visionary Brings 30 Years of Leadership Experience in Global High Tech Businesses to Security Start-Up
Symantec to Deliver Keynote at GlobalPlatforms Annual TEE Conference
Products and Releases  |  7/22/2015  | 
Agenda will address the role of the TEE in securing connected devices, standardization, use cases, certification and security evaluation
Gigamon Launches Security Delivery Platform
Products and Releases  |  7/21/2015  | 
Unveils GigaSECURE for Pervasive Visibility of Network Traffic and Delivers it to Multiple Security Devices Simultaneously without Impacting Network Availability
Pitney Bowes Announces Communications Hub For SMBs
Products and Releases  |  7/21/2015  | 
Metascan Now Supports Linux With Enhanced Security And Scalability
Products and Releases  |  7/21/2015  | 
OPSWAT adds support for Linux to their Multi Anti-Malware Scanner Metascan to provide enhanced security, scalability, and usability.
Ziften Rolls Out Next-Gen Endpoint Solution
Products and Releases  |  7/21/2015  | 
Ziftens Next-gen Endpoint Security Solution Deploys in Minutes to Immediately Discover, Analyze, and Seal Security Exposures Where Businesses are Most Vulnerable
Pulse Secure Unveils Next Generation Platform to Power Mobile Access to Datacenter Applications and Cloud Services
Products and Releases  |  7/21/2015  | 
High Performance Pulse Secure Appliance with Centralized Management Provides Breakthrough Performance with Operational Scale and Simplicity
IT Decision Makers Cite Lack of Time, Deployment Expertise as Top Obstacles to EMV Readiness
Products and Releases  |  7/21/2015  | 
New Randstad Technologies Survey Finds 40 Percent of Businesses Wont Meet October Liability Shift Deadline
KnowBe4 Automates Security Awareness Training for IT
Products and Releases  |  7/20/2015  | 
Most requested feature added to Kevin Mitnick Security Awareness Training
Rook Security Collaborates With FBI Indianapolis Cyber Task Force On Threat Intelligence To Reduce Impact Of Hacking Team Breach
Products and Releases  |  7/17/2015  | 
Indianapolis Security Firm Takes Industry Lead with Comprehensive Analysis of Breached Weaponizable Files; Releases Free Automated Detection Tool to Help Companies Know if They are Affected
Verizon Unveils New Managed Service
Products and Releases  |  7/17/2015  | 
Proactive Privacy Practices Can Mitigate Damage from Data Breach
Products and Releases  |  7/16/2015  | 
TRUSTe expands privacy solutions to help companies minimize potential damages with data breach response plan
SMBs at Risk of Data Privacy Threats
Products and Releases  |  7/15/2015  | 
Nominations Announced for Women in Security Awards 2015
Products and Releases  |  7/15/2015  | 
Duo Security Presents its First Annual Women in Security Awards
CounterTack Acquires ManTech Cyber Solutions International to Deliver Endpoint Detection and Response Capabilities
Products and Releases  |  7/15/2015  | 
Acquisition Supports Aggressive Go-to-Market Expansion to Surpass its 200+ Customers by Combining Real-Time Behavioral Threat Detection with In-Memory Endpoint Threat Analysis
IKANOW Optimizes Enterprise Security with Updated Analytics Platform
Products and Releases  |  7/15/2015  | 
Adds Scalability, Flexibility, Performance; Combines SIEM and Threat Intelligence Data with Customized, Robust Analytics
IOActive Joins the Institute for Critical Infrastructure Technology
Products and Releases  |  7/15/2015  | 
Companys Smart Cities research to be used to educate U.S. Senate and U.S. House of Representatives on security issues
Malwarebytes Releases Mac Product and Acquires AdwareMedic Giving Mac Users Malware Detection and Removal Capabilities
Products and Releases  |  7/15/2015  | 
Release of Malwarebytes Anti-Malware for Mac brings powerful security layer to Mac users; Acquisition to build on current OS X protection capabilities
ThreatConnect Debuts New TC Exchange Offering
Products and Releases  |  7/15/2015  | 
Leveraging a True Threat Intelligence Platform, Organizations Now Have Ability to Build, Host and Exchange Customized Secure Applications for Improved Intel Gathering
Vietnamese National Sentenced to 13 Years in Prison for Operating a Massive International Hacking and Identity Theft Scheme
Products and Releases  |  7/14/2015  | 
Hieu Minh Ngo stole and sold personally identifiable information on approximately 200 million U.S. citizens.
Vectra Networks Discovers High Severity Internet Explorer 11 Vulnerability Following Hacking Team Cyber Attack
Products and Releases  |  7/14/2015  | 
Vectra Threat Lab Finds Exploitable Use-After-Free Vulnerability that Can Let Attackers Bypass Standard Memory Protections in Popular Web Browser
Verint Enhances Its Identity Authentication Offering
Products and Releases  |  7/14/2015  | 
Solution Advancements Enable a More Efficient Approach to Identity Authentication to Help Safeguard Customers, Save Time and Reduce Interaction Costs
Corero Network Security Survey Finds Degradation of Customer Confidence and Lost Revenues are the Most Damaging Ramifications of DDoS Attacks
Products and Releases  |  7/14/2015  | 
Study Highlights the Effects of DDoS Attacks and How Businesses are Addressing the Threat Today
Wombat Security Expands Security Awareness Training Capabilities with Bit9 + Carbon Black Partnership
Products and Releases  |  7/13/2015  | 
New Technology Partnership Enables Businesses to Sense and Interrupt Risky Employee Behavior With "Just-in-Time" Training to Lower Cyber Security Vulnerabilities
Page 1 / 2   >   >>


Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Risk, Privacy, and Information Security Officer, AvePoint, Inc.,  8/20/2018
Ohio Man Sentenced To 15 Months For BEC Scam
Dark Reading Staff 8/20/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10902
PUBLISHED: 2018-08-21
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possib...
CVE-2018-10932
PUBLISHED: 2018-08-21
lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal.
CVE-2018-15660
PUBLISHED: 2018-08-21
** DISPUTED ** An issue was discovered in the Ola Money (aka com.olacabs.olamoney) application 1.9.0 for Android. If an attacker controls an application with accessibility permissions, then the attacker can read certain Ola Money data such as a credit card number, expiration date, bank account numbe...
CVE-2018-15661
PUBLISHED: 2018-08-21
** DISPUTED ** An issue was discovered in the Ola Money (aka com.olacabs.olamoney) application 1.9.0 for Android. If an attacker controls an application with accessibility permissions and the ability to read SMS messages, then the Forgot Password screen can be used to bypass authentication. NOTE: th...
CVE-2018-15481
PUBLISHED: 2018-08-21
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the...