Products and Releases

Content posted in July 2017
AppGuard Relaunches With $50 Million Investment
Products and Releases  |  7/31/2017  | 
Endpoint cybersecurity company also announces a number of Symantec Japan executives have Joined the Company, including former President and CTO.
Duo Security Partners With VMware to Tackle Unmanaged Devices
Products and Releases  |  7/31/2017  | 
The partnership is designed to address the influx of unmanaged devices accessing corporate applications.
Experian uses alternative data to help verify international identities
Products and Releases  |  7/31/2017  | 
Experian uses alternative data to help verify international identities Email verification and email attributes can help companies validate customers even when they are residing out of their home.
Capsule8 Launches Threat Prevention and Response Platform Beta for Cloud-Native Environments
Products and Releases  |  7/28/2017  | 
Company Providing Private Demonstrations at Black Hat USA
No More Ransom celebrates its first year
Products and Releases  |  7/25/2017  | 
Over 28,000 devices decrypted and 100+ global partners signed up.
Nyotron Raises $21 Million Funding Round
Products and Releases  |  7/24/2017  | 
Appoints Former McAfee Executive Peter Stewart to Chief Executive Officer.
Checkmarx Acquires Codebashing to Redefine Secure Coding Education
Products and Releases  |  7/24/2017  | 
Through Acquisition, Checkmarx will Provide Interactive Tools to Further Developer Application Security Knowledge and Deliver Secure Applications Even Faster.
FireEye Assisting National Police of Ukraine with Recent EternalPetya Investigation
Products and Releases  |  7/24/2017  | 
Security firm is assisting law enforcement with forensic investigation of physical machines and data affected by the cyber attack.
Internet Bug Bounty Receives New Funding to Expand Internet Safety Program
Products and Releases  |  7/21/2017  | 
Facebook, Ford Foundation and GitHub donate $300,000 to award hackers who improve internet infrastructure
TeamLogic IT Helps Small Businesses Develop Cybersecurity Roadmap
Products and Releases  |  7/21/2017  | 
Managed IT Services Franchise Brings Education and Awareness to the Front Line of Ransomware.
New RiskSense Service Detects IoT and OT Network Security Threats/Vulnerabilities
Products and Releases  |  7/21/2017  | 
Cyber Risk Management Leader Announces New Offering to Cover Emerging Technologies and Environments including Smart Logistics Systems, Internet of Things, and Automotive Control Systems
Check Point Teams with Microsoft Intune to Secure Enterprise Mobility
Products and Releases  |  7/21/2017  | 
Check Point integrates its SandBlast Mobile with a Microsoft enterprise mobility product.
88% of Retailers Believe They are at Risk of Data Threats
Products and Releases  |  7/21/2017  | 
Yearly data breach rate drops from 22% to 19% those breached at any time 52%.
Acalvio Partners with Splunk on Active Deception-Based Ransomware Solution
Products and Releases  |  7/21/2017  | 
Free Trial of ShadowPlex-R Offers Organizations the Ability to Test Drive Deception 2.0-Based Solution. .
ScaleFT Closes $2M Seed Funding, Launches Zero Trust Solution for Cloud Security
Products and Releases  |  7/19/2017  | 
Inspired by Google's BeyondCorp architecture, ScaleFT Zero Trust Access Management protects corporate resources without VPNs
Less than One-Third of Companies Unprepared to Meet EU GDPR
Products and Releases  |  7/18/2017  | 
Less than a third of organizations believe they are compliant or on the way to compliance; 30% state that they will need to make substantial changes to be compliant.
Bay Dynamics Announces Technology Partnership with Symantec to Detect and Stop Insider Threats
Products and Releases  |  7/18/2017  | 
Bay Dynamics User and Entity Behavior Analytics (UEBA) Technology Partnership with Symantec Enables Organizations to Identify Malicious Insiders & Prioritize Threats to Data Assets
Onapsis Identifies and Helps Oracle Secure Critical Vulnerability in E-Business Suite (EBS)
Products and Releases  |  7/18/2017  | 
In advance of annual Black Hat conference, Onapsis Research Labs threat intelligence protects Oracle customers from severe risks affecting EBS-based platforms
Black Duck Teams Up with Pivotal to Secure and Manage Open Source Cloud-Native Applications for the Enterprise
Products and Releases  |  7/18/2017  | 
Collaboration integrates Black Duck Hub and Pivotal Cloud Foundry to deliver a Secure DevOps process and user experience
Tozny Launches End-To-End Data Security Encryption Toolkit For Developers
Products and Releases  |  7/18/2017  | 
InnoVault toolkit enables developers building websites, apps, and software to easily embed end-to-end data security and privacy.
Minerva Boosts Anti-Evasion Platform Capabilities
Products and Releases  |  7/18/2017  | 
Expands deception-based approach for endpoint security to fight broader evasive malware techniques.
SIEM Complexities Increase IR Costs, Decrease IR Productivity
Products and Releases  |  7/17/2017  | 
New Report from Cyphort and Osterman Research Puts Spotlight on SIEM User Challenges and How Incident Responders Spend Their Time
States Pledge to Meet Cyber Threats
Products and Releases  |  7/14/2017  | 
Outgoing National Governors Association Chair Gov. McAuliffe Sunsets his Initiative, 38 Governors Sign Compact
Flashpoint Announces $28 Million Series C Led by Georgian Partners
Products and Releases  |  7/12/2017  | 
Increasing global demand for business risk intelligence (BRI) drives latest funding round with new partner and existing investors.
Cylance Integrates AI-driven Engine into VirusTotal
Products and Releases  |  7/11/2017  | 
RiskLens Secures $5 Million Series A Equity Investment
Products and Releases  |  7/11/2017  | 
High-profile industry commendation results in back-to-back OpRisk award wins for RiskLens, cementing its leadership position as the provider of choice for purpose-built risk quantification solutions.
Portnox Rapid Ransomware Response and Control Aims to Aid Recovery from Attacks
Products and Releases  |  7/11/2017  | 
Using full network visibility, Portnox monitors and disconnects infected devices during ransomware attacks, speeding up recovery time.
HPE Software Boosts Security in its Backup Suite
Products and Releases  |  7/11/2017  | 
HPE Adaptive Backup and Recovery Suite delivers secure approach to data protection, simplifying complexity and reducing costs.
IBM, Ponemon: Business Continuity Management Helps Save Time and Cost Post-Breach
Products and Releases  |  7/7/2017  | 
Cloud resiliency orchestration is transforming business continuity to help companies achieve consistent business objectives.
FIRST Releases Practices for Multi-Party Vulnerability Coordination and Disclosure
Products and Releases  |  7/6/2017  | 
The Forum of Incident Response and Security Teams announces the release of a set of guidelines and norms for vulnerability disclosure that affects multiple parties.
Cloud Security Vendor, ShieldX, Emerges From Stealth
Products and Releases  |  7/5/2017  | 
Recognized as a Gartner 'Cool Vendor' in 2017, SheildX emerges with a new cloud security product: APEIRO.
Cloud Identity Leader Auth0 Adds $30 Million Series C
Products and Releases  |  7/5/2017  | 
Company revenue grows three-fold year-over-year as customer base extends across multiple industries. Auth0 will use the new funds to double down on security, extensibility, and simplicity.
Retail Cyber Intelligence Sharing Center Names New Executive Director
Products and Releases  |  7/5/2017  | 
The Retail Cyber Intelligence Sharing Center (R-CISC) will expand its sharing capabilities in the coming months.


Government Shutdown Brings Certificate Lapse Woes
Curtis Franklin Jr., Senior Editor at Dark Reading,  1/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: On the SS7 network, nobody knows you're a dog.
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-5740
PUBLISHED: 2019-01-16
"deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is i...
CVE-2018-5741
PUBLISHED: 2019-01-16
To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update ...
CVE-2016-9778
PUBLISHED: 2019-01-16
An error in handling certain queries can cause an assertion failure when a server is using the nxdomain-redirect feature to cover a zone for which it is also providing authoritative service. A vulnerable server could be intentionally stopped by an attacker if it was using a configuration that met th...
CVE-2017-3135
PUBLISHED: 2019-01-16
Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1...
CVE-2017-3136
PUBLISHED: 2019-01-16
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were me...