Products and Releases

Content posted in September 2016
FireMon Welcomes New President & CEO, Satin H. Mirchandani
Products and Releases  |  9/30/2016  | 
Security management vendor forges ahead with new CEO at the helm
ISAO Standards Organization To Release Initial Voluntary Guidelines For ISAOs
Products and Releases  |  9/30/2016  | 
ISAO documents in response to Executive Order 13691 available Friday, September 30 on ISAO.org
Trustwave Unveils Federated Global Security Operations
Products and Releases  |  9/29/2016  | 
Global Network of Federated, Advanced Security Operations Centers powered by Trustwave Ushers in the Next Generation of Cybersecurity Protection
Lenovo, Intel, Paypal And Synaptics Announce Collaboration To Bring Fido Authentication To Laptops
Products and Releases  |  9/22/2016  | 
ENOVO, INTEL, PAYPAL AND SYNAPTICS REVEAL COLLABORATION TO BRING A SIMPLE AND SAFE ONLINE AUTHENTICATION TO PCS WITH THE INDUSTRYS FIRST FIDO-ENABLED EMBEDDED FINGERPRINT SOLUTION.
White Ops Increases Market Momentum with $20 Million Series B
Products and Releases  |  9/19/2016  | 
Funding from Paladin Capital Group and Grotech Ventures Will Accelerate Innovation and Expand Sales and Marketing Footprint
Symantec Endpoint Protection Cloud Secures SMBs Against Growing Threats
Products and Releases  |  9/17/2016  | 
65 Percent of Targeted Attacks are Launched Against Small and Mid-sized Businesses to Steal Confidential Customer Information for Financial Gain.
Trusona Releases Cloud Identity Suite and Launches the #NoPasswords Revolution
Products and Releases  |  9/17/2016  | 
Trusona Essential is Free and Designed to Eliminate Passwords to Create a Safer Internet
Introducing A New Secure Memory Stick
Products and Releases  |  9/16/2016  | 
Centrifys Survey Finds Consumers More Concerned with Financial Data Getting Hacked than Private Information about Their Families Being Exposed
Products and Releases  |  9/16/2016  | 
Survey also reveals consumers more likely to hear about data breaches from the news or social medianot from companies holding their data.
Optiv Security Launches Technology-Enabled Third-Party Risk Managed Service
Products and Releases  |  9/16/2016  | 
Enables Companies to Better Manage Entire Vendor, Supplier and Business Associate Risk Management Lifecycles, Improving Compliance and Risk Management
IoT Village at DEF CON 24 Uncovers Extensive Security Flaws in Connected Devices
Products and Releases  |  9/16/2016  | 
Researchers Discover 47 New Security Vulnerabilities across 23 Devices and 21 Manufacturers; Executive Leadership from FTC and FCC Weigh in.
New report: 12 hot markets for cybersecurity jobs
Products and Releases  |  9/16/2016  | 
Randstad Technologies Announces 12 Markets with High Demand for Cybersecurity Talent
Bay Dynamics Announces Major Enhancements to Flagship Cyber Risk Analytics Platform
Products and Releases  |  9/16/2016  | 
New Version of Risk Fabric Prioritizes Threats and Vulnerabilities, Deputizes Line-of-Business Leaders and Automates Cyber Risk Management
Vectra Networks Takes On Backdoors in Data Center Firewalls Planted by Advanced Adversaries
Products and Releases  |  9/15/2016  | 
These attack vectors are aimed at blind spots in all network and server infrastructure
HPE Aruba Introduces Developer-Ready Mobile First Platform to Unlock the Potential of Modern IT Infrastructures
Products and Releases  |  9/13/2016  | 
Aruba Mobile First Platform Provides Real-Time Insights to Improve User Experiences and IoT Security; New Partner Ready for Networking Program Expands Revenue Opportunities for the Channel
Anomali and Department of Homeland Security Collaboration Enables Groundbreaking Automated Public/Private Sector Cybersecurity Information Sharing
Products and Releases  |  9/12/2016  | 
Automated, Anonymized Public/Private Threat Intelligence Sharing Enables More Effective Protection of National Critical Infrastructure and Attacks Against U.S. Organizations
iovation Acquires LaunchKey, Combines Global Fraud Intelligence and Transparent Authentication with Dynamic Multifactor Authentication
Products and Releases  |  9/7/2016  | 
Branded for the business, the combined solution gives organizations a path to the future of authentication, while giving their customers more trust and confidence than ever before


High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
CVE-2013-7469
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
CVE-2018-20146
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
CVE-2019-5727
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.