Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Research from Omdia

Latest Content
Page 1 / 2   >   >>
It's Time to Address Cybersecurity Complexity
Research  |  8/4/2020  | 
Overlapping layers of security controls and technologies have deluged enterprises with security complexity. There are four steps that organizations can take to help reduce the complexity.
Fortinet Fills its Zero Trust Access Gap with OPAQ Acquisition
Research  |  7/28/2020  | 
With newly acquired OPAQ Networks, Fortinet intends to create its own so-called Secure Access Service Edge (SASE) offering, which combines SD-WAN, network security, and zero trust access (ZTA) features and delivers them via the cloud.
Sophos Evolve 2020: Sophos Embraces Change to Pursue Growth
Research  |  7/24/2020  | 
Sophos in 2020 is taking the painful but necessary steps to reshape its business. With some key competitors struggling, the vendor believes the time is right to capitalize on a unique opportunity to accelerate its growth.
Fundamentals of Identity as a Service (IDaaS)
Research  |  7/23/2020  | 
With cloud-based identity's speed, scalability, and cost advantages, on-premises products now fall squarely in the category of legacy technology, regardless of enterprise IT infrastructure.
Fundamentals of Network Traffic Decryption and Risk Management
Research  |  7/22/2020  | 
Visibility into and inspection of inbound encrypted network traffic is essential for sound enterprise network security. Decryption approaches must soon change due to increasing cost and complexity, but alternative technologies are emerging.
Wake Up to Cyber-Espionage
Research  |  7/17/2020  | 
Cyber-espionage has hit the headlines, with APT29 accused of attempting to steal COVID-19 vaccine development information. Organizations in all sectors should not be surprised that cyber-espionage is real and must be addressed.
Integrating Risk Management with Cybersecurity to Govern Protection for Digital Assets
Research  |  7/15/2020  | 
Cybersecurity should be aligned with organizational governance. This drives the right type and level of information security governance, incorporating risk and compliance management, and can guide prioritization of resources and investments.
The DXC Xchanging Attack Shows Ransomware is Back with a Vengeance
Research  |  7/10/2020  | 
IT service provider DXC announced that its Xchanging subsidiary is facing a ransomware attack. Ransomware is again the industry's top threat vector, as the world grapples with COVID-19.
A New Opportunity to Break the 'Rule of Steve'
Research  |  7/1/2020  | 
To build the workforce, diversity must be encouraged: more women, more ethnic diversity, more neurodiversity. That requires more people from a range of groups who have the aptitude and attitude to work in cybersecurity.
On the Radar: Ermetic Provides Cloud Permissions Management
Research  |  6/30/2020  | 
Ermetic provides security for data stores, databases, and some compute instances in IaaS and PaaS.
Versa Enters the Zero-Trust Access market
Research  |  6/29/2020  | 
Software-defined wide area network (SD-WAN) vendor Versa Networks has entered an adjacent and complementary market, launching a zero-trust access (ZTA) product.
On the Radar: BotRx Offers Runtime Security for Web Applications
Research  |  6/25/2020  | 
BotRx provides a software service to protect web and mobile apps from bot attacks.
Palo Alto Networks Shifts Cloud-Based ML Features Into its NGFW Appliances
Research  |  6/24/2020  | 
Palo Alto Networks is effectively reversing a multiyear industry trend among network security vendors, itself included, by shifting functions out of the cloud and into the firewall itself to improve real-time threat detection.
DDoS Prevention Appliances Market Tracker - Update H1 2020
Research  |  6/23/2020  | 
The updated DDoS Prevention Appliances Market Tracker provides accurate data -- including market size, vendor market share, forecasts, and market trends -- to help clients make better business decisions in the DDoS appliances market.
Threat Mitigation Products Market Database - Q1 2020
Research  |  6/23/2020  | 
The latest data-only market tracker, providing a total view of the cybersecurity technology market by combining the data from three segments: Content Security Gateway Appliances, Network Security Appliances, and DDoS Prevention Appliances.
CipherCloud Remains a CASB, But Builds a SASE Ecosystem
Research  |  6/10/2020  | 
CipherCloud is a longstanding member of the cloud access security broker (CASB) sector.
On the Radar: OPAQ Offers Network- and Security-as-a-Service
Research  |  6/10/2020  | 
OPAQ offers networking and security delivered as services from its own IP backbone.
Network Security Appliances & Software Market Tracker - Q1 2020
Research  |  6/9/2020  | 
Get the latest data and analyses -- including market size, vendor market share, forecasts, and market trends -- to help clients make better business decisions in the network security appliances and software market.
VMware Pushes Toward XDR Play with Acquisition of NDR Vendor Lastline
Research  |  6/8/2020  | 
VMware has acquired Lastline, a network detection and response (NDR) vendor. It is pursuing an XDR offering to compete with Palo Alto Networks and Trend Micro.
Zscaler Acquires Edgewise Networks for Hybrid Cloud Data Center Security
Research  |  6/5/2020  | 
The move offers Zscaler a solution that can directly compete with hybrid cloud data center security and visibility solutions from Cisco and VMware.
On the Radar: IronNet Cybersecurity Applies Analytics, Threat Intelligence for Collective Defense
Research  |  6/5/2020  | 
IronNet discovers overlooked threats using a combination of analytics-powered network threat detection and real-time threat intelligence sharing and collaboration, which it calls collective defense.
Market Landscape: Industrial IoT Cybersecurity Operation and Management Solutions
Research  |  6/3/2020  | 
With exponential growth in the number of Internet of Things devices currently in use, there are few markets in greater need of cybersecurity protection than the industrial sector.
Fortinet Accelerate 2020: High-Performance Hardware and SD-WAN Deliver Strong Growth
Research  |  5/28/2020  | 
After earning the top position by revenue in the next-generation firewall market, Fortinet is pressing its advantages in performance and SD-WAN, but its strategy for cloud-delivered security is unclear.
Stellar Cyber Adds Cloud Detection and Response to its XDR offering
Research  |  5/28/2020  | 
Stellar Cyber has launched a capability for cloud environments to complement the endpoint and network dimensions already addressed by its Starlight platform.
On the Radar: PerimeterX Protects Web Apps Against Bots, Malicious Code, and API Abuse
Research  |  5/28/2020  | 
PerimeterX delivers application security across three distinct areas: bots, the application code itself, and application programming interfaces (APIs).
Verizon 2020 Data Breach Investigations Report: Phishing and Credential Theft Top List of Successful Tactics
Research  |  5/27/2020  | 
Adversaries successfully breach enterprises largely because of phishing and credential theft, the same techniques that have worked for years.
Cloud Email Challenges and Security Differentiators
Research  |  5/27/2020  | 
Cloud email has become the norm for many organizations, yet there are still challenges that can be difficult to overcome.
Thanks to COVID-19, Your Next Data Breach May Already be Underway
Research  |  5/26/2020  | 
As organizations adapt to the ongoing pandemic, changes in the technology they use, how they use it, and how they secure it (or, dont secure it) have created a perfect storm of opportunity for adversaries to strike.
ZIVVER Applies Rigorous Control to Secure the Overall Email Communication Process
Research  |  5/22/2020  | 
The communication demands of highly regulated sectors is one of the reasons why legacy technology is still being used to authenticate senders and recipients and protect the privacy of shared information.
The landgrab in CSPM Continues Apace
Research  |  5/20/2020  | 
The acquisition at the end of April of CSPM developer DivvyCloud by Rapid7 was the latest in a series of purchases of CSPM players, mostly by companies with broader portfolios.
Analyst Commentary: PAM Market Leader CyberArk Enters IDaaS with Idaptive Buy
Research  |  5/19/2020  | 
CyberArk, the market leader in privileged access management (PAM), has entered the identity-as-a-service (IDaaS) segment with the $70m acquisition of Idaptive.
On the Radar: Zettaset Delivers Encryption for Containers Orchestrated by K8s
Research  |  5/13/2020  | 
Zettaset delivers what it terms software-defined encryption technology for data at rest in physical on-premises, virtual, and cloud environments.
On the Radar: Micro Focus Offers Transparent Encryption for Unstructured Data
Research  |  5/13/2020  | 
Business software vendor Micro Focus has launched Voltage SmartCipher, which provides transparent encryption for unstructured data.
Do We Need to Accept a Lack of Privacy in Order to Fight COVID-19?
Research  |  5/12/2020  | 
Data privacy has been hard fought in many countries. Countries enacting either mandatory or voluntary approaches to track-and-trace must be abundantly clear about how data will be used.
On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access
Research  |  5/6/2020  | 
Axis Security has developed a cloud-based platform to deliver secure remote access based on a zero-trust approach.
COVID-19: Extending Opportunities for Security Incidents and Breaches
Research  |  4/28/2020  | 
Prior to the pandemic, many organizations had enabled remote working for a portion of the workforce, where it was feasible. But the rapid acceleration has created new security challenges for the enterprise.
On the Radar: SSH.COM Plans SaaS Version of its Just-In-Time PAM Platform
Research  |  4/23/2020  | 
SSH Communications Security came into existence to monetize the market opportunity stemming from the widespread adoption of the SSH protocol invented by its founder.
On the Radar: King & Union Enables Cyberthreat Investigation
Research  |  4/22/2020  | 
King & Union develops and markets technology that enables cyberthreat analysis.
On the Radar: 42Crunch Secures APIs in the Development Pipeline and At Runtime
Research  |  4/20/2020  | 
42Crunch provides API security, both at runtime and in the continuous integration/continuous delivery (CI/CD) pipeline.
Sumo Logic Fills Out its Portfolio After the Acquisition of JASK
Research  |  4/17/2020  | 
In the wake of its November 2019 acquisition of JASK, a competitor in the security management market, Sumo Logic has expanded its product portfolio.
News Analysis: VMware Pressures NGFW Vendors with Updated Distributed Data Center Firewalling
Research  |  4/15/2020  | 
VMware intends to integrate networking and security functionality across physical and virtual data centers, edge networks, and cloud environments. Firewall vendors have reason to be wary of VMware's effort to displace them inside the data center.
Analyst Commentary: Another CSPM Vendor Snapped Up as Zscaler Buys Cloudneeti
Research  |  4/14/2020  | 
Zscaler, which provides security services from the cloud, has announced the acquisition of Cloudneeti, a developer of cloud security posture management (CSPM) technology.
Analyst Commentary: Bug Bounty Programs Should Help Find and Fix Flaws, Not Hide Them
Research  |  4/9/2020  | 
Bug bounty platform providers allow vendors to silence cybersecurity researchers without ever fixing the vulnerabilities they find. A code of ethics is needed to discourage the hiding of bugs and, instead, encourage finding and fixing them.
On the Radar: ALTR Offers Data Security as a Cloud-Based Service
Research  |  4/8/2020  | 
ALTR provides Data Security as a Service (DSaaS) to mitigate the risk of direct access to and consumption of sensitive enterprise data. The platform offers data access monitoring, governance, and at-rest protection and provides these capabilities natively at the application layer.
On the Radar: Echosec Systems Provides Online Info Discovery and Data Gathering
Research  |  4/7/2020  | 
Echosec Systems develops data discovery technology that it delivers in software-as-a-service (SaaS) mode.
On the Radar: Awake Security Offers Network Detection and Response
Research  |  4/7/2020  | 
Awake Security develops technology to analyze traffic on corporate networks via passive networking monitoring, and recently supplemented its technology with a managed service.
Palo Alto Networks Accelerates its SD-WAN Plans with a $420m CloudGenix Acquisition
Research  |  4/2/2020  | 
The CloudGenix deal is Palo Alto Networks' second major strategic initiative related to SD-WAN in less than six months, suggesting the vendor may have underestimated market demand for security-driven or "secure" SD-WAN. It is correcting that error, and quickly.
McAfee Ticks Multiple Threat Intel Boxes with MVISION Insights
Research  |  4/2/2020  | 
McAfee is readying a threat intelligence service called MVISION Insights, featuring intel produced by the vendor's researchers, threat prioritization based on the customer's security posture and local context, and scoring of its current protection level.
Analyst Commentary: Has COVID-19 Thrown the Data Privacy Rule Book Out of the Window?
Research  |  4/2/2020  | 
COVID-19 is changing our lives, both personal and professional. Data privacy is not immune to the impact of COVID-19, and decisions are being made about data privacy during this pandemic that should be giving us all pause for thought.
Page 1 / 2   >   >>

COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-10
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
PUBLISHED: 2020-08-10
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
PUBLISHED: 2020-08-10
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
PUBLISHED: 2020-08-10
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
PUBLISHED: 2020-08-10
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.