Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Latest Content
Page 1 / 2   >   >>
Kaspersky: More Senior Execs Making Cyber Decisions
Products and Releases  |  11/14/2019  | 
Statistics support trend of IT security managers being a part of IT decision making discussions.
Trend Micro Launches Smart Factory Security Solutions
Products and Releases  |  11/13/2019  | 
Offerings designed to provide enhanced visibility and protection for embattled industrial control system (ICS) environments.
MITRE Engenuity Announces the Center for Threat-Informed Defense
Products and Releases  |  11/13/2019  | 
Thirteen organizations join Center as founding participants for R&D collaboration
Nuspire Security Researchers Discover 730% Increase in Emotet Activity
Products and Releases  |  11/13/2019  | 
Recent quarterly threat report highlights the return of Emotet activity throughout Q3
Cybrary Lands $15 Million in Series B Funding
Products and Releases  |  11/13/2019  | 
New Funding Propels Growth of Cybrarys Online Workforce Development Platform Being Utilized by Nearly 3 Million Cyber Pros Today
Siemplify Integrates MITRE ATT&CK Framework into Security Operations Platform
Products and Releases  |  11/12/2019  | 
The SOAR Provider aims to enable faster investigations and actionable insights by mapping with the global repository of attacker tools and techniques.
Cybervore Changes Direction, Introduces Fragglestorm
Products and Releases  |  11/12/2019  | 
A new cybersecurity tool aims to protect data from breaches and ransomware.
Jamf Launches Jamf Protect, Enterprise Endpoint Protection Built for Mac
Products and Releases  |  11/12/2019  | 
Jamf Protect uses native Apple security tools and on-device analysis to give security teams visibility into their Mac fleet.
Fortress Launches Collaboration to Help Protect the Power Grid from Cyber Threats
Products and Releases  |  11/8/2019  | 
Fortress Information Security launches the Asset to Vendor Network (A2V), a new platform where electric energy companies can collectively help reduce the costs of protecting the U.S. power grid from cyber threats.
CISA Releases Cyber Essentials for Small Businesses and Governments
Products and Releases  |  11/7/2019  | 
Set of cybersecurity best practices will enhance the nation's collective defense against cyber threats.
Cyxtera Technologies Announces Spin Out of Cybersecurity Business
Products and Releases  |  11/6/2019  | 
New company powers comprehensive secure access and anti-fraud solutions with offensive expertise Mike Aiello appointed CEO of AppGate Inc.
Adaptiva's Evolve VM Now Scans for Every Vulnerability in the National Vulnerability Database Within 15 Minutes
Products and Releases  |  11/4/2019  | 
Enterprises Protected by Unmatched Speed and Scale With Industry's First Complete Life Cycle Vulnerability Management Product
Fewer than half of cybersecurity professionals have a plan in place to deal with IoT attacks, despite the fact that ninety percent worry about future threats
Products and Releases  |  11/1/2019  | 
New study from Neustar finds that 48% of organizations reported experiencing an attack on connected devices in the last year alone
Threat Stack Announces Python Support for Application Security Monitoring
Products and Releases  |  10/30/2019  | 
Threat Stack Application Security Monitoring helps customers proactively reduce risk during application development and block attacks in real time.
NordVPN Lists 5 Measures to Supercharge Its Security
Products and Releases  |  10/29/2019  | 
NordVPN signs a strategic partnership with VerSprite, a leading cybersecurity consulting firm.
HP Introduces New Printing Innovations and Security Enhancements that Simplify Fleet Security Management
Products and Releases  |  10/29/2019  | 
Offerings will all be available next month.
New Mini Documentary Examines How University of New Haven is Addressing Cybersecurity Talent Gap, Preparing Workforce of the Future
Products and Releases  |  10/28/2019  | 
Produced by Ibrahim "Abe" Baggili an internationally recognized digital forensics expert for Cybersecurity Awareness Month, the short film gives an inside look at a pioneering camp developed by the University to prepare and help diversify the cybersecurity workforce of the future.
Splunk Mission Control Takes Off
Products and Releases  |  10/22/2019  | 
New Splunk Security Solutions Help the SOC Turn Data into Business Outcomes
Claroty Appoints Thorsten Freitag as Chief Executive Officer
Products and Releases  |  10/22/2019  | 
Company Taps Industry Veterans Extensive Executive Leadership and Field Operations Experience to Drive Continued Growth
Resecurity Forms Team to Deliver In-Depth Analysis of Data Inside Context Platform
Products and Releases  |  10/15/2019  | 
The Hunter Unit specializes in deep and dark web analysis, based on human intelligence.
Forcepoint Delivers Global Security Cloud Offering
Products and Releases  |  10/15/2019  | 
Forcepoint uniquely delivers global cloud infrastructure with 160 points of presence, industry's most comprehensive cloud certifications and patent-pending proxy-less endpoint
Forescout Delivers Impact-Based Security Risk Assessment Tool for Industrial Control System and Operational Technology Networks
Products and Releases  |  10/14/2019  | 
SilentDefense mitigates risks against increased ICS security threats with new performance analytics and compliance standards for large enterprises
Deloitte Consumer Privacy in Retail Survey: The Next Regulatory and Competitive Frontier
Products and Releases  |  10/9/2019  | 
Retail is at an inflection point with consumer privacy; nearly half of consumers feel they have lost control of their data
FireEye Launches Digital Threat Monitoring to Protect Organizations' Brands, People & Data
Products and Releases  |  10/9/2019  | 
New service monitors the deep, dark and open web, alerting to threats across the digital underground.
FireEye Launches Purple Team Assessments
Products and Releases  |  10/9/2019  | 
Purple Team and Continuous Purple Team Assessments enable organizations to quantifiably evaluate security controls and programs against Verodin simulated attack scenarios
vArmour Announces Version 5 of its Application Controller with SDK and Security Graph Technology
Products and Releases  |  10/8/2019  | 
Application relationships put on center spotlight to help organizations intelligently reduce risk.
VMware Completes Acquisition of Carbon Black
Products and Releases  |  10/8/2019  | 
Combined Solutions Help Transform the Industry with a Modern Security Cloud Platform Built for Any Application, Running on Any Cloud, on Any Device
Sila and Ponemon Institute Study Finds Rampant Lapses in Securing Access to Sensitive Information
Products and Releases  |  10/8/2019  | 
Joint Research Finds Major Challenges Monitoring and Managing Privileged User Access and Activities, with 70 Percent of Respondents Indicating Users Likely to Access Sensitive or Confidential Data Without a Business Need
Trend Micro and Snyk Enter Strategic Partnership
Products and Releases  |  10/8/2019  | 
Partnership begins with integrated 'shield-and-fix' approach to open source vulnerabilities for DevOps.
Xacta.io Leverages Security Data at Scale to Actively Manage Cyber-Risk
Products and Releases  |  10/8/2019  | 
Telos Corporation delivers next-generation cyber-risk management platform for complex on-premises, hybrid, and cloud-based environments.
Former RSA Chairman Art Coviello Joins CloudKnox Strategic Advisory Board
Products and Releases  |  10/7/2019  | 
Highly-Recognized Security Strategist Will Help Guide CloudKnoxs Accelerating Growth and Expansion
Florida Poly Researcher Targets New Android cyber Attack
Products and Releases  |  10/3/2019  | 
A researcher points to two-part malware as a rising factor in mobile threats.
Code42 2019 Global Data Exposure Report Finds 69% of Security Leaders Say Data Loss Prevention Cannot Stop Insider Threat
Products and Releases  |  10/3/2019  | 
New research underscores major data security threat posed by employee actions
Osano Launches Data Privacy and Compliance Platform
Products and Releases  |  10/3/2019  | 
SaaS Solution Makes Privacy and Compliance Easy, Fast and Affordable for Companies of All Sizes
Unum ID App Launches To Protect Against Mass Identity Theft
Products and Releases  |  10/2/2019  | 
With investment from Samsung NEXT, Unum will provide a decentralized platform to secure personal information and identity
Terrible OpSec Reveals Inner Workings of Hacking Group in Control of Several Million Euros Affecting More than 800,000 People in Russia
Products and Releases  |  10/2/2019  | 
Researchers from Czech Technical University, UNCUYO University and Avast dissect the new Geost Android botnet and its handlers at the Virus Bulletin Conference 2019
eSentire and Carbon Black Release New Threat Intelligence Spotlight Report on the Shifting Framework of Modern Malware
Products and Releases  |  10/1/2019  | 
Research reveals how evolving threats can readily bypass legacy antivirus solutions
Anomali Altitude Delivers Automated Intelligence Driven Cybersecurity Solutions
Products and Releases  |  9/30/2019  | 
Customers Automate Detection, Analysis, Prioritization, Response, and Answers to Questions About All Threats, Including Any Identified in Web Based Content Spanning News, Twitter, Blogs, Research, Threat Bulletins, SIEM Logs, and More
Man Sentenced to Prison for Cyber Sabotage
Products and Releases  |  9/27/2019  | 
AI-Powered APEX Anti-Malware Engine Comes Out of Beta
Products and Releases  |  9/27/2019  | 
SecureAge announces AI roll out amid UI overhauls and new tiered version structure for SecureAPlus antivirus.
Cloud-Native Breaches Differ Greatly from Malware Attacks of the Past: McAfee Report
Products and Releases  |  9/24/2019  | 
Report demonstrates how 99 percent of misconfiguration incidents in public cloud environments go undetected, exposing companies to data loss.
Page 1 / 2   >   >>


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19071
PUBLISHED: 2019-11-18
A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
CVE-2019-19072
PUBLISHED: 2019-11-18
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
CVE-2019-19073
PUBLISHED: 2019-11-18
Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, ...
CVE-2019-19074
PUBLISHED: 2019-11-18
A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
CVE-2019-19075
PUBLISHED: 2019-11-18
A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.