Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

02:00 PM
Dark Reading
Dark Reading
Products and Releases

IOActive Launches New Hardware Lab

Company adds new Global 50 clients to roster, expands into Middle East

Seattle, USA — March 23, 2015IOActive, Inc., the leading global provider of hardware, software, and wetware security services, announced strong business results for the fiscal year ending December 31, 2014. Growth was driven by innovative and groundbreaking research, as well as international expansion and success in vertical markets.

“IOActive had an incredible 2014 that celebrated several firsts,” said Jennifer Steffens, chief executive officer for IOActive. “Innovative research from our team helped secure success for us in vertical, emerging markets and also drove expansion within our Industrial and Vehicle practice areas globally.”

“Our steady growth is indicative of the fact that every company–be it a start-up or a 40-year-old Fortune 500 company–is a target for attackers and cyber criminals,” said Matt Rahman, executive vice president of global sales and marketing for IOActive. “Third-party security assessment is no longer a ‘nice to have’ for companies, but an accepted organizational best practice.”

Key highlights for 2014 include:

         Industry-leading Research by IOActive Staff

o   Mobile banking apps research highlighted vulnerabilities in mobile banking applications from some of the most influential banks around the world.  

o   SATCOM security research revealed issues in the satellite communication (SATCOM) terminals used by the aerospace, maritime, military and government, emergency service, industrial (oil rigs, gas, electricity), and media sectors.

o   Traffic control systems research highlighted issues in traffic control systems around the world, laying the foundation for bigger security issues facing Smart Cities.

o   Vehicle security research examined the world of the connected car and what it means to the automotive industry.

        Market Growth and Expansion

In addition to expanding into the Middle East, IOActive continued to add new customers throughout the US, Europe, Asia, and Africa.

        Expanding Service Practice Areas

IOActive expanded its Vehicle Security Service practice. The company now offers full vehicle assessments and private research, as well as a Vehicle Security Development Lifecycle program. IOActive also appointed Twitter’s Charlie Miller to its Advisory Board.         

IOActive’s Industrial Service practice has been updated to address the Industrial Internet of Things (IoT) and shifts in Operational Technology (OT) customers, as well as new advances in the transportation and healthcare industries.

        Industry Recognition

IOActive was included on the list of Cool Vendors for Managing OT in a Digital Business, 2014 [1] report by Gartner, Inc.

New Hardware Lab

In addition to today’s results announcement, IOActive is launching a newly expanded hardware lab to provide services from chip to code. The lab underwent a significant transformation in 2014 when it relocated to a 5,000 square-foot space equipped with Scanning Electron Microscopes (SEMs), Focussed Ion Beams (FIBs), confocal optical imaging equipment, and a variety of analytical tools. As adversaries exploit hardware, IOActive will stay ahead through continued research.

The lab offers:

?         Embedded device security analysis

?         Physical attack resistance

?         Low-level device firmware and driver assessment

?         Chip and semiconductor analysis

?         Several other services not made public

For a video overview of the lab, presented by Jason Larsen, principal security consultant for IOActive, please visit: http://www.ioactive.com/labs/resources-white-papers.html

About IOActive

IOActive is a comprehensive, high-end information security services firm with a long and established track record in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment to chip reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, US, with global operations through the Americas, EMEA, and Asia Pac regions. Visit www.ioactive.com for more information. Read the IOActive Labs Research Blog: http://blog.ioactive.com. Follow IOActive on Twitter: http://twitter.com/ioactive.

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

[1] Gartner “Cool Vendors for Managing OT in a Digital Business, 2014” by Kristian Steenstrup, Earl Perkins, Alfonso Velosa, April 22, 2014


Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-12
This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.
PUBLISHED: 2021-04-12
INTELBRAS TELEFONE IP TIP200 version allows an attacker to obtain sensitive information through /cgi-bin/cgiServer.exx.
PUBLISHED: 2021-04-12
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover pa...
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory as an arbitrary type, which can result in a memory ...
PUBLISHED: 2021-04-11
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the sam...