Products and Releases

Content posted in July 2015
Page 1 / 2   >   >>
Google Ventures-backed Rocana Launches "Rocana Ops"
Products and Releases  |  7/31/2015  | 
Rocana Ops Is the First Product to Market Using Big Data and Advanced Analytics to Address $20 Billion Dollar IT Operations Management Market
Comilion Makes Secure and Private Cyber Security Collaboration between Enterprises Possible
Products and Releases  |  7/31/2015  | 
The company announces the definitive secured collaboration platform between companies
Nearly 80 Percent Of Consumers Think Vehicle Hacking Will Be Frequent Problem In Near Future, According To New Kelley Blue Book Survey
Products and Releases  |  7/31/2015  | 
Almost Half Will Consider News of Recent Vehicle Hacking Incident When Buying/Leasing Next Car; Domestic Auto Manufacturers Deemed Most Susceptible to Vehicle Hacking
Shellshock Activity Still Tracked to 138 Countries in Solutionary Q2 2015 SERT Threat Report
Products and Releases  |  7/31/2015  | 
U.S. and China Lead Top Sources of Command and Control Traffic; 48 Percent of Top 25 Hostile Non-U.S. IP Addresses Are "Bruteforce" Repeat Offenders
Blue Coat Acquires Perspecsys
Products and Releases  |  7/30/2015  | 
Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data compliance requirements & regional sovereigntyregulations
Most Major Financial Hacks Completely Covered Up
Products and Releases  |  7/30/2015  | 
Lieberman Software survey reveals most companies are persistently targeted by cyber attacks and the public only finds out about a small portion of security breaches
BISHOP FOX TO SPEAK AT BLACK HAT, DEF CON, AND BSIDES LAS VEGAS
Products and Releases  |  7/29/2015  | 
Security researchers will release groundbreaking vulnerabilities and cutting-edge RFID hacking methods
IOActive Turns Las Vegas into a Smart City during Black Hat and DEF CON
Products and Releases  |  7/29/2015  | 
Company to showcase series of research centered on math, physics, advanced technology, and SCADA
Accenture Survey: Companies Faced With Cyberattacks Daily Are Not Prepared
Products and Releases  |  7/29/2015  | 
Nearly two-thirds of C-suite executives surveyed indicate that cyberattacks occur daily or weekly.
OWASP Announces Final Agenda and Lightning Trainings for AppSec USA 2015 Conference
Products and Releases  |  7/28/2015  | 
Facebook CSO, Microsoft MVP and Department of Homeland Security Chief Cybersecurity Officer Join AppSec Experts to Discuss Current Threat Landscape
CYREN Unveils First Mass-Scale Sandbox Service
Products and Releases  |  7/28/2015  | 
Company introduces next generation of sandbox technology with automated logic and a global cloud infrastructure
Icon Labs Releases Security Management System
Products and Releases  |  7/28/2015  | 
Icon Labs Floodgate Security Manager provides security management for Internet of Things (IoT), Industrial Control, Medical, Smart Grid and DoD Devices. New Security Management System provides security management that scales to IoT edge devices, including mobile, wireless, battery powered and mesh-based IoT sensors.
Farsight Security To Relaunch Security Information Exchange at Black Hat USA
Products and Releases  |  7/28/2015  | 
2015 Worlds Largest, Real-Time Threat Intelligence Information Technology Platform Offers Four New Technologies To Provide Unprecedented Visibility on Changing Internet
PwC Germany and Imperva to Deliver New Cyber Security Solution
Products and Releases  |  7/28/2015  | 
PwC all4cloud Offering to Leverage Imperva Incapsula and Imperva Skyfence to Protect Cloud-Based Applications
Next Generation of Comodos Enterprise Endpoint Security Solution Now Available
Products and Releases  |  7/28/2015  | 
Automatic Containment Technology at the Heart of Comodo ESM 3.4 to Keep Customers Protected From Known and Unknown Threats
Balabit launches eCSI Hacker Playground Competition for Black Hat USA 2015
Products and Releases  |  7/23/2015  | 
Top International Security Provider Teams With Silent Signal to Sponsor Hacker Challenge With Prizes of a Ticket to BlackHat Europe 2015, MacBook Air, Lego Mindstorms and More
OpenDNS Delivers New Release of Investigate Threat Intelligence Product
Products and Releases  |  7/23/2015  | 
OpenDNSs security search engine makes threat intelligence both interactive and actionable with access to contextual data
Fortscale Enhances Insider Threat Offering
Products and Releases  |  7/22/2015  | 
Operational Workflow Integration, Enhanced Behavior Analytics and Rapid Response Toolbox Among New Features in Version 1.4 that Cuts Response Time By Up to 30 Percent
Security Mentor Expands Gamification Experience Encouraging Greater Employee Participation and Engagement
Products and Releases  |  7/22/2015  | 
Security Awareness Training Leader Adds New Game-Based Learning Capabilities Increasing Engagement and Propelling Program Success
RSA Debuts New Lifecycle and Governance Identity Solution
Products and Releases  |  7/22/2015  | 
New Capabilities Speed Detection of Unauthorized Privilege Escalation and Remediation of Account Compromise
Spikes Security Names Industry Veteran Michael Mansouri President and COO
Products and Releases  |  7/22/2015  | 
Successful Serial Entrepreneur and Technology Visionary Brings 30 Years of Leadership Experience in Global High Tech Businesses to Security Start-Up
Symantec to Deliver Keynote at GlobalPlatforms Annual TEE Conference
Products and Releases  |  7/22/2015  | 
Agenda will address the role of the TEE in securing connected devices, standardization, use cases, certification and security evaluation
Gigamon Launches Security Delivery Platform
Products and Releases  |  7/21/2015  | 
Unveils GigaSECURE for Pervasive Visibility of Network Traffic and Delivers it to Multiple Security Devices Simultaneously without Impacting Network Availability
Pitney Bowes Announces Communications Hub For SMBs
Products and Releases  |  7/21/2015  | 
Metascan Now Supports Linux With Enhanced Security And Scalability
Products and Releases  |  7/21/2015  | 
OPSWAT adds support for Linux to their Multi Anti-Malware Scanner Metascan to provide enhanced security, scalability, and usability.
Ziften Rolls Out Next-Gen Endpoint Solution
Products and Releases  |  7/21/2015  | 
Ziftens Next-gen Endpoint Security Solution Deploys in Minutes to Immediately Discover, Analyze, and Seal Security Exposures Where Businesses are Most Vulnerable
Pulse Secure Unveils Next Generation Platform to Power Mobile Access to Datacenter Applications and Cloud Services
Products and Releases  |  7/21/2015  | 
High Performance Pulse Secure Appliance with Centralized Management Provides Breakthrough Performance with Operational Scale and Simplicity
IT Decision Makers Cite Lack of Time, Deployment Expertise as Top Obstacles to EMV Readiness
Products and Releases  |  7/21/2015  | 
New Randstad Technologies Survey Finds 40 Percent of Businesses Wont Meet October Liability Shift Deadline
KnowBe4 Automates Security Awareness Training for IT
Products and Releases  |  7/20/2015  | 
Most requested feature added to Kevin Mitnick Security Awareness Training
Rook Security Collaborates With FBI Indianapolis Cyber Task Force On Threat Intelligence To Reduce Impact Of Hacking Team Breach
Products and Releases  |  7/17/2015  | 
Indianapolis Security Firm Takes Industry Lead with Comprehensive Analysis of Breached Weaponizable Files; Releases Free Automated Detection Tool to Help Companies Know if They are Affected
Verizon Unveils New Managed Service
Products and Releases  |  7/17/2015  | 
Proactive Privacy Practices Can Mitigate Damage from Data Breach
Products and Releases  |  7/16/2015  | 
TRUSTe expands privacy solutions to help companies minimize potential damages with data breach response plan
SMBs at Risk of Data Privacy Threats
Products and Releases  |  7/15/2015  | 
Nominations Announced for Women in Security Awards 2015
Products and Releases  |  7/15/2015  | 
Duo Security Presents its First Annual Women in Security Awards
CounterTack Acquires ManTech Cyber Solutions International to Deliver Endpoint Detection and Response Capabilities
Products and Releases  |  7/15/2015  | 
Acquisition Supports Aggressive Go-to-Market Expansion to Surpass its 200+ Customers by Combining Real-Time Behavioral Threat Detection with In-Memory Endpoint Threat Analysis
IKANOW Optimizes Enterprise Security with Updated Analytics Platform
Products and Releases  |  7/15/2015  | 
Adds Scalability, Flexibility, Performance; Combines SIEM and Threat Intelligence Data with Customized, Robust Analytics
IOActive Joins the Institute for Critical Infrastructure Technology
Products and Releases  |  7/15/2015  | 
Companys Smart Cities research to be used to educate U.S. Senate and U.S. House of Representatives on security issues
Malwarebytes Releases Mac Product and Acquires AdwareMedic Giving Mac Users Malware Detection and Removal Capabilities
Products and Releases  |  7/15/2015  | 
Release of Malwarebytes Anti-Malware for Mac brings powerful security layer to Mac users; Acquisition to build on current OS X protection capabilities
ThreatConnect Debuts New TC Exchange Offering
Products and Releases  |  7/15/2015  | 
Leveraging a True Threat Intelligence Platform, Organizations Now Have Ability to Build, Host and Exchange Customized Secure Applications for Improved Intel Gathering
Vietnamese National Sentenced to 13 Years in Prison for Operating a Massive International Hacking and Identity Theft Scheme
Products and Releases  |  7/14/2015  | 
Hieu Minh Ngo stole and sold personally identifiable information on approximately 200 million U.S. citizens.
Vectra Networks Discovers High Severity Internet Explorer 11 Vulnerability Following Hacking Team Cyber Attack
Products and Releases  |  7/14/2015  | 
Vectra Threat Lab Finds Exploitable Use-After-Free Vulnerability that Can Let Attackers Bypass Standard Memory Protections in Popular Web Browser
Verint Enhances Its Identity Authentication Offering
Products and Releases  |  7/14/2015  | 
Solution Advancements Enable a More Efficient Approach to Identity Authentication to Help Safeguard Customers, Save Time and Reduce Interaction Costs
Corero Network Security Survey Finds Degradation of Customer Confidence and Lost Revenues are the Most Damaging Ramifications of DDoS Attacks
Products and Releases  |  7/14/2015  | 
Study Highlights the Effects of DDoS Attacks and How Businesses are Addressing the Threat Today
Wombat Security Expands Security Awareness Training Capabilities with Bit9 + Carbon Black Partnership
Products and Releases  |  7/13/2015  | 
New Technology Partnership Enables Businesses to Sense and Interrupt Risky Employee Behavior With "Just-in-Time" Training to Lower Cyber Security Vulnerabilities
Page 1 / 2   >   >>


New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
What Israel's Elite Defense Force Unit 8200 Can Teach Security about Diversity
Lital Asher-Dotan, Senior Director, Security Research and Content, Cybereason,  5/21/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10000
PUBLISHED: 2018-05-24
In MuPDF 1.12.0 and earlier, multiple use of uninitialized value bugs in the PDF parser could allow an attacker to cause a denial of service (crash) or influence program flow via a crafted file.
CVE-2018-10001
PUBLISHED: 2018-05-24
OpenFlow version 1.0 onwards contains a Denial of Service and Improper authorization vulnerability in OpenFlow handshake: The DPID (DataPath IDentifier) in the features_reply message are inherently trusted by the controller. that can result in Denial of Service, Unauthorized Access, Network Instabil...
CVE-2018-10001
PUBLISHED: 2018-05-24
The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed ...
CVE-2018-10003
PUBLISHED: 2018-05-24
curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerab...
CVE-2018-10003
PUBLISHED: 2018-05-24
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been...