Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in July 2017
AppGuard Relaunches With $50 Million Investment
Products and Releases  |  7/31/2017  | 
Endpoint cybersecurity company also announces a number of Symantec Japan executives have Joined the Company, including former President and CTO.
Duo Security Partners With VMware to Tackle Unmanaged Devices
Products and Releases  |  7/31/2017  | 
The partnership is designed to address the influx of unmanaged devices accessing corporate applications.
Experian uses alternative data to help verify international identities
Products and Releases  |  7/31/2017  | 
Experian uses alternative data to help verify international identities Email verification and email attributes can help companies validate customers even when they are residing out of their home.
Capsule8 Launches Threat Prevention and Response Platform Beta for Cloud-Native Environments
Products and Releases  |  7/28/2017  | 
Company Providing Private Demonstrations at Black Hat USA
No More Ransom celebrates its first year
Products and Releases  |  7/25/2017  | 
Over 28,000 devices decrypted and 100+ global partners signed up.
Nyotron Raises $21 Million Funding Round
Products and Releases  |  7/24/2017  | 
Appoints Former McAfee Executive Peter Stewart to Chief Executive Officer.
Checkmarx Acquires Codebashing to Redefine Secure Coding Education
Products and Releases  |  7/24/2017  | 
Through Acquisition, Checkmarx will Provide Interactive Tools to Further Developer Application Security Knowledge and Deliver Secure Applications Even Faster.
FireEye Assisting National Police of Ukraine with Recent EternalPetya Investigation
Products and Releases  |  7/24/2017  | 
Security firm is assisting law enforcement with forensic investigation of physical machines and data affected by the cyber attack.
Internet Bug Bounty Receives New Funding to Expand Internet Safety Program
Products and Releases  |  7/21/2017  | 
Facebook, Ford Foundation and GitHub donate $300,000 to award hackers who improve internet infrastructure
TeamLogic IT Helps Small Businesses Develop Cybersecurity Roadmap
Products and Releases  |  7/21/2017  | 
Managed IT Services Franchise Brings Education and Awareness to the Front Line of Ransomware.
New RiskSense Service Detects IoT and OT Network Security Threats/Vulnerabilities
Products and Releases  |  7/21/2017  | 
Cyber Risk Management Leader Announces New Offering to Cover Emerging Technologies and Environments including Smart Logistics Systems, Internet of Things, and Automotive Control Systems
Check Point Teams with Microsoft Intune to Secure Enterprise Mobility
Products and Releases  |  7/21/2017  | 
Check Point integrates its SandBlast Mobile with a Microsoft enterprise mobility product.
88% of Retailers Believe They are at Risk of Data Threats
Products and Releases  |  7/21/2017  | 
Yearly data breach rate drops from 22% to 19% those breached at any time 52%.
Acalvio Partners with Splunk on Active Deception-Based Ransomware Solution
Products and Releases  |  7/21/2017  | 
Free Trial of ShadowPlex-R Offers Organizations the Ability to Test Drive Deception 2.0-Based Solution. .
ScaleFT Closes $2M Seed Funding, Launches Zero Trust Solution for Cloud Security
Products and Releases  |  7/19/2017  | 
Inspired by Google's BeyondCorp architecture, ScaleFT Zero Trust Access Management protects corporate resources without VPNs
Less than One-Third of Companies Unprepared to Meet EU GDPR
Products and Releases  |  7/18/2017  | 
Less than a third of organizations believe they are compliant or on the way to compliance; 30% state that they will need to make substantial changes to be compliant.
Bay Dynamics Announces Technology Partnership with Symantec to Detect and Stop Insider Threats
Products and Releases  |  7/18/2017  | 
Bay Dynamics User and Entity Behavior Analytics (UEBA) Technology Partnership with Symantec Enables Organizations to Identify Malicious Insiders & Prioritize Threats to Data Assets
Onapsis Identifies and Helps Oracle Secure Critical Vulnerability in E-Business Suite (EBS)
Products and Releases  |  7/18/2017  | 
In advance of annual Black Hat conference, Onapsis Research Labs threat intelligence protects Oracle customers from severe risks affecting EBS-based platforms
Black Duck Teams Up with Pivotal to Secure and Manage Open Source Cloud-Native Applications for the Enterprise
Products and Releases  |  7/18/2017  | 
Collaboration integrates Black Duck Hub and Pivotal Cloud Foundry to deliver a Secure DevOps process and user experience
Tozny Launches End-To-End Data Security Encryption Toolkit For Developers
Products and Releases  |  7/18/2017  | 
InnoVault toolkit enables developers building websites, apps, and software to easily embed end-to-end data security and privacy.
Minerva Boosts Anti-Evasion Platform Capabilities
Products and Releases  |  7/18/2017  | 
Expands deception-based approach for endpoint security to fight broader evasive malware techniques.
SIEM Complexities Increase IR Costs, Decrease IR Productivity
Products and Releases  |  7/17/2017  | 
New Report from Cyphort and Osterman Research Puts Spotlight on SIEM User Challenges and How Incident Responders Spend Their Time
States Pledge to Meet Cyber Threats
Products and Releases  |  7/14/2017  | 
Outgoing National Governors Association Chair Gov. McAuliffe Sunsets his Initiative, 38 Governors Sign Compact
Flashpoint Announces $28 Million Series C Led by Georgian Partners
Products and Releases  |  7/12/2017  | 
Increasing global demand for business risk intelligence (BRI) drives latest funding round with new partner and existing investors.
Cylance Integrates AI-driven Engine into VirusTotal
Products and Releases  |  7/11/2017  | 
RiskLens Secures $5 Million Series A Equity Investment
Products and Releases  |  7/11/2017  | 
High-profile industry commendation results in back-to-back OpRisk award wins for RiskLens, cementing its leadership position as the provider of choice for purpose-built risk quantification solutions.
Portnox Rapid Ransomware Response and Control Aims to Aid Recovery from Attacks
Products and Releases  |  7/11/2017  | 
Using full network visibility, Portnox monitors and disconnects infected devices during ransomware attacks, speeding up recovery time.
HPE Software Boosts Security in its Backup Suite
Products and Releases  |  7/11/2017  | 
HPE Adaptive Backup and Recovery Suite delivers secure approach to data protection, simplifying complexity and reducing costs.
IBM, Ponemon: Business Continuity Management Helps Save Time and Cost Post-Breach
Products and Releases  |  7/7/2017  | 
Cloud resiliency orchestration is transforming business continuity to help companies achieve consistent business objectives.
FIRST Releases Practices for Multi-Party Vulnerability Coordination and Disclosure
Products and Releases  |  7/6/2017  | 
The Forum of Incident Response and Security Teams announces the release of a set of guidelines and norms for vulnerability disclosure that affects multiple parties.
Cloud Security Vendor, ShieldX, Emerges From Stealth
Products and Releases  |  7/5/2017  | 
Recognized as a Gartner 'Cool Vendor' in 2017, SheildX emerges with a new cloud security product: APEIRO.
Cloud Identity Leader Auth0 Adds $30 Million Series C
Products and Releases  |  7/5/2017  | 
Company revenue grows three-fold year-over-year as customer base extends across multiple industries. Auth0 will use the new funds to double down on security, extensibility, and simplicity.
Retail Cyber Intelligence Sharing Center Names New Executive Director
Products and Releases  |  7/5/2017  | 
The Retail Cyber Intelligence Sharing Center (R-CISC) will expand its sharing capabilities in the coming months.


Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19645
PUBLISHED: 2019-12-09
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
CVE-2019-19678
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the generic field entry point via the Generic Test Definition field of a new Generic Test issue.
CVE-2019-19679
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the Pre-Condition Summary entry point via the summary field of a Create Pre-Condition action for a new Test Issue.
CVE-2019-19647
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
CVE-2019-19648
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.