Products and Releases

Content posted in September 2017
SecurityFirst DataKeep Protecting Data From Creation to Deletion
Products and Releases  |  9/27/2017  | 
Cost-effective, scalable and transparent data-centric protection for companies of any size
Lacework Announces Immediate Support for Microsoft Windows Server
Products and Releases  |  9/27/2017  | 
Simplifies Cloud Security with Technology That Addresses Hybrid Cloud Environments in One Solution
BullGuard Launches Next-Generation Anti-Malware Engine Across All BullGuard Products And First-of-Its-Kind, Real-Time Home Network Scanner
Products and Releases  |  9/27/2017  | 
Comprehensive range of leading-edge consumer cybersecurity products cover both the endpoint and network layers; Home Network Scanner features industry-first, internal and external scanner that monitors and scans all connected devices to protect from outside hackers
Citadels New Department of Intelligence and Security Studies First of its Kind in South Carolina
Products and Releases  |  9/27/2017  | 
Founded by former FBI special agent
Aruba Modernizes Network Security to Reduce Risk
Products and Releases  |  9/22/2017  | 
Aruba 360 Secure Fabric delivers new analytics-driven, advanced cyber protection in UEBA to simplify enterprise security.
Dashlane Announces Dashlane Business 2.0
Products and Releases  |  9/22/2017  | 
Launch of latest enterprise password management solution lets IT administrators educate, onboard, and enforce corporate password policies.
New Research from Intermedia Reveals a False Sense of Confidence Among Office Workers with Phishing Scams Still on the Rise
Products and Releases  |  9/22/2017  | 
Despite continued education and awareness, one in five office workers continue to be a victim of costly phishing emails
Attivo Networks Tackles Cloud Threat Detection Gaps
Products and Releases  |  9/22/2017  | 
Expands ThreatDefend Cloud Data Center offerings for Azure, AWS, and OpenStack.
HID Global to Acquire Mercury Security, Expanding its Leadership in Access Control
Products and Releases  |  9/21/2017  | 
HID Global signs an agreement to acquire Mercury Security, an OEM supplier of controllers for physical access control.
Intelisecure Launches Solutions, Managed Services Offering to Protect Critical Data
Products and Releases  |  9/21/2017  | 
New offering aims to help midsize enterprises meet their data protection needs at a consumable price point.
Symantec Protects Data Everywhere with Information Centric Security
Products and Releases  |  9/20/2017  | 
Symantec Data Loss Prevention 15 integrates with tagging, encryption and access management to secure regulated and sensitive data wherever it goes.
SMBs are Huge Target for Hackers: 2017 Ponemon Study
Products and Releases  |  9/20/2017  | 
Benchmarking Critical Exercise in Early Stages of Software Security: BSIMM8
Products and Releases  |  9/20/2017  | 
Latest iteration of the building security in maturity model shows more organizations jumpstarting their software security initiatives with assessments and improving over time.
Atlantic.Net Unveils Cloud Platform to Encrypt Customer Data
Products and Releases  |  9/19/2017  | 
Cloud hosting solutions provider encrypts all customer data stored at rest.
Venafi Awarded Two New Patents
Products and Releases  |  9/14/2017  | 
Stuart McClure, CEO and Co-Founder of Cylance Inc., Joins JASKs Board of Directors
Products and Releases  |  9/14/2017  | 
JASK Appoints Cybersecurity Pioneer to Help Usher in Next Iteration of Machine Learning-Based Security Technology
AppGuard Closes a $30 Million Series B to Accelerate Growth in Enterprise and SMB Markets
Products and Releases  |  9/14/2017  | 
Series B funding brings total financing to $100m for AppGuard since April
CyberScout Elite Brings Commercial Cyber Coverage to High Net Worth Households
Products and Releases  |  9/13/2017  | 
Offering combines concierge service with a suite of commercial quality protective services and the convenience of a mobile app.
Former General Counsel for US Intelligence Community Joins Morrison & Foerster
Products and Releases  |  9/13/2017  | 
Robert S. Litt will further strengthen the firms growing National Security and Global Risk & Crisis Management Practices.
81% of Infosec Pros Say Required Job Skills Have Changed
Products and Releases  |  9/6/2017  | 
The change comes amid a skills gap the industry is facing.


Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19279
PUBLISHED: 2018-11-14
PRIMX ZoneCentral before 6.1.2236 on Windows sometimes leaks the plaintext of NTFS files. On non-SSD devices, this is limited to a 5-second window and file sizes less than 600 bytes. The effect on SSD devices may be greater.
CVE-2018-19280
PUBLISHED: 2018-11-14
Centreon 3.4.x has XSS via the resource name or macro expression of a poller macro.
CVE-2018-19281
PUBLISHED: 2018-11-14
Centreon 3.4.x allows SNMP trap SQL Injection.
CVE-2018-17960
PUBLISHED: 2018-11-14
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
CVE-2018-19278
PUBLISHED: 2018-11-14
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed lengt...