Products and Releases

Content posted in September 2017
SecurityFirst DataKeep Protecting Data From Creation to Deletion
Products and Releases  |  9/27/2017  | 
Cost-effective, scalable and transparent data-centric protection for companies of any size
Lacework Announces Immediate Support for Microsoft Windows Server
Products and Releases  |  9/27/2017  | 
Simplifies Cloud Security with Technology That Addresses Hybrid Cloud Environments in One Solution
BullGuard Launches Next-Generation Anti-Malware Engine Across All BullGuard Products And First-of-Its-Kind, Real-Time Home Network Scanner
Products and Releases  |  9/27/2017  | 
Comprehensive range of leading-edge consumer cybersecurity products cover both the endpoint and network layers; Home Network Scanner features industry-first, internal and external scanner that monitors and scans all connected devices to protect from outside hackers
Citadels New Department of Intelligence and Security Studies First of its Kind in South Carolina
Products and Releases  |  9/27/2017  | 
Founded by former FBI special agent
Aruba Modernizes Network Security to Reduce Risk
Products and Releases  |  9/22/2017  | 
Aruba 360 Secure Fabric delivers new analytics-driven, advanced cyber protection in UEBA to simplify enterprise security.
Dashlane Announces Dashlane Business 2.0
Products and Releases  |  9/22/2017  | 
Launch of latest enterprise password management solution lets IT administrators educate, onboard, and enforce corporate password policies.
New Research from Intermedia Reveals a False Sense of Confidence Among Office Workers with Phishing Scams Still on the Rise
Products and Releases  |  9/22/2017  | 
Despite continued education and awareness, one in five office workers continue to be a victim of costly phishing emails
Attivo Networks Tackles Cloud Threat Detection Gaps
Products and Releases  |  9/22/2017  | 
Expands ThreatDefend Cloud Data Center offerings for Azure, AWS, and OpenStack.
HID Global to Acquire Mercury Security, Expanding its Leadership in Access Control
Products and Releases  |  9/21/2017  | 
HID Global signs an agreement to acquire Mercury Security, an OEM supplier of controllers for physical access control.
Intelisecure Launches Solutions, Managed Services Offering to Protect Critical Data
Products and Releases  |  9/21/2017  | 
New offering aims to help midsize enterprises meet their data protection needs at a consumable price point.
Symantec Protects Data Everywhere with Information Centric Security
Products and Releases  |  9/20/2017  | 
Symantec Data Loss Prevention 15 integrates with tagging, encryption and access management to secure regulated and sensitive data wherever it goes.
SMBs are Huge Target for Hackers: 2017 Ponemon Study
Products and Releases  |  9/20/2017  | 
Benchmarking Critical Exercise in Early Stages of Software Security: BSIMM8
Products and Releases  |  9/20/2017  | 
Latest iteration of the building security in maturity model shows more organizations jumpstarting their software security initiatives with assessments and improving over time.
Atlantic.Net Unveils Cloud Platform to Encrypt Customer Data
Products and Releases  |  9/19/2017  | 
Cloud hosting solutions provider encrypts all customer data stored at rest.
Venafi Awarded Two New Patents
Products and Releases  |  9/14/2017  | 
Stuart McClure, CEO and Co-Founder of Cylance Inc., Joins JASKs Board of Directors
Products and Releases  |  9/14/2017  | 
JASK Appoints Cybersecurity Pioneer to Help Usher in Next Iteration of Machine Learning-Based Security Technology
AppGuard Closes a $30 Million Series B to Accelerate Growth in Enterprise and SMB Markets
Products and Releases  |  9/14/2017  | 
Series B funding brings total financing to $100m for AppGuard since April
CyberScout Elite Brings Commercial Cyber Coverage to High Net Worth Households
Products and Releases  |  9/13/2017  | 
Offering combines concierge service with a suite of commercial quality protective services and the convenience of a mobile app.
Former General Counsel for US Intelligence Community Joins Morrison & Foerster
Products and Releases  |  9/13/2017  | 
Robert S. Litt will further strengthen the firms growing National Security and Global Risk & Crisis Management Practices.
81% of Infosec Pros Say Required Job Skills Have Changed
Products and Releases  |  9/6/2017  | 
The change comes amid a skills gap the industry is facing.


New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-3018
PUBLISHED: 2018-05-24
The AXIS webapp in deploy-tomcat/axis in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 allows remote attackers to obtain sensitive configuration information via a direct request, as demonstrated by happyaxis.jsp. IBM X-Force ID: 84354.
CVE-2013-3023
PUBLISHED: 2018-05-24
IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2 and 7.2.0 through 7.2.1.4 might allow remote attackers to obtain sensitive information about Tomcat credentials by sniffing the network for a session in which HTTP is used. IBM X-Force ID: 84361.
CVE-2013-3024
PUBLISHED: 2018-05-24
IBM WebSphere Application Server (WAS) 8.5 through 8.5.0.2 on UNIX allows local users to gain privileges by leveraging improper process initialization. IBM X-Force ID: 84362.
CVE-2018-5674
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...
CVE-2018-5675
PUBLISHED: 2018-05-24
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw...