Products and Releases

Latest Content
Page 1 / 2   >   >>
Onapsis and Exabeam Partner to Bring ERP to the Security Operations Center
Products and Releases  |  3/14/2019  | 
New integration Improves Monitoring, Threat Detection, Incident Response and Compliance
Mocana Adds New Funding
Products and Releases  |  3/14/2019  | 
Mocanas IoT Device Security Platform Gains Wider Adoption as Alternative IT and OT Security Solutions Fall Short
Optiv Security Announces New Risk Transformation Service to Help Organizations Mitigate Enterprise Risk
Products and Releases  |  3/14/2019  | 
Enables clients to embrace the risk revolution and fundamentally rewrite how they manage cybersecurity to achieve business resilience.
Adlink and Entrust Datacard Make Industry 4.0 Secure-by-Design at Hannover Messe
Products and Releases  |  3/14/2019  | 
Entrust Datacard will demonstrate edge computing security capabilities with Adlink in the Adlink display.
OPAQ Awarded Patent for Cyber Risk Assessment Technology
Products and Releases  |  3/14/2019  | 
Security-as-a-Service platform provider expands IP portfolio with fifth patent, enabling eompanies to continuously identify and address their biggest security risks.
Dark Web Investigation Exposes Underground Marketplace for TLS/SSL Certificates
Products and Releases  |  3/6/2019  | 
Venafi study uncovers thriving marketplaces for TLS certificates sold individually and packaged with a wide range of crimeware.
Fidelis Cybersecurity Delivers Innovations to Provide Full Visibility of the Cyber Terrain
Products and Releases  |  3/5/2019  | 
Fidelis Elevate is the first platform of its kind to enable organizations to calculate their vulnerable attack surface and respond accordingly to build a robust defense.
Survey: 160% Increase in Destructive Attacks Targeting Financial Institutions
Products and Releases  |  3/5/2019  | 
Report reveals the cyber threats keeping financial CISOs awake at night, including Emotet, Steganography & Hidden Cobra.
SafeGuard Cyber Launches New Tool to Detect, Defend Against Cross-Channel Cyber Threats
Products and Releases  |  3/5/2019  | 
The machine learning-powered threat decision engine is designed to detect risks across social media, enterprise apps, Deep Web, and Dark Web to protect businesses from emerging attacks.
Kingston to Highlight Encrypted USB Drives, Enterprise SSDs at RSA
Products and Releases  |  3/4/2019  | 
Server Premier memory products also will be on display.
General Dynamics Mission Systems Partners with Bitglass on Cloud Security
Products and Releases  |  3/4/2019  | 
Route 66 Cyber CASB extends an enterprises existing security policies into the cloud.
Tripwire Debuts Pen Testing and Industrial Cybersecurity Assessment Services
Products and Releases  |  3/4/2019  | 
New service offerings reinforce critical security controls, assess security weaknesses of enterprises and industrial organizations
HyperQube Virtualized Network Promises 90% Savings on Cyber Efforts
Products and Releases  |  3/4/2019  | 
New approach aims to disrupt enterprise network security, development & scaling for both small and large organizations.
TrueVault Launches TrueVault Atlas To Automate Aspects of GDPR Compliance
Products and Releases  |  3/1/2019  | 
New solutionautomates the day-to-day compliance tasks of GDPR and the upcoming California Consumer Privacy Act (CCPA).
SpyCloud Raises $21M in Series B Funding, Will Focus on Account Takeover Prevention
Products and Releases  |  2/28/2019  | 
M12, Microsoft's venture fund, and others back efforts to prevent account exposure and takeover.
IBM X-Force Red Adds Onapsis to Uncover Critical Vulnerabilities
Products and Releases  |  2/28/2019  | 
Onapsis ERP technology will help IBM identify exploitable vulnerabilities in business-critical applications like SAP and Oracle.
Symantec Announces Updates to Platform, Partners with Amazon, Box, Splunk & Others
Products and Releases  |  2/28/2019  | 
More than 120 Partners, Including AWS, Box, IBM Security, Microsoft, Oracle, ServiceNow and Splunk, Commit to Symantecs Integrated Cyber Defense Platform
Survey: Cybercrime More Devastating to SMBs than Other Threats Fire, Flood, Transit Strike Combined
Products and Releases  |  2/27/2019  | 
Majority of Business Leaders Say a Breach Could End Their Business, While Others Remain Unaware of Catastrophic Potential
Radiflow Incorporates Dynamic Vulnerability Assessment Scoring into its Industrial Threat Detection Solution
Products and Releases  |  2/27/2019  | 
New version automates mapping and prioritization of vulnerabilities according to potential impact on OT networks and business logic of industrial operations
ThreadFix Delivers Vulnerability Mgmt for Network and Apps
Products and Releases  |  2/27/2019  | 
Vulnerability correlation capabilities provide complete visibility of risk to associated business operations and supports enterprise reporting.
Survey: CIOs see IT moving from cost center to trust center, even as challenges abound
Products and Releases  |  2/26/2019  | 
The days of the CIO serving strictly as an IT operator are over, according to the survey.
Pulse Secure Delivers Secure Access for Hybrid IT with Software Defined Perimeter Solutions
Products and Releases  |  2/25/2019  | 
New Pulse Access Suite with SDP delivers provisioning simplicity, scale and improved economics.
Illusive Networks Introduces Interactive Cyber Intelligence to Defend Organizations Against Human Attackers
Products and Releases  |  2/21/2019  | 
Empowers cyber defenders, and increases cyber resilience, with industry-leading precision in capturing, analyzing, and applying forensic insights
K2 Cyber Security Unveils Cloud Workload Protection Platform to Prevent Zero-Day Attacks in Real Time
Products and Releases  |  2/21/2019  | 
Disruptive startup exits stealth with $6 million in funding and the first deterministic approach for protecting hybrid clouds against sophisticated attacks
Prevalent Announces New CEO, Expands Leadership Team with 3 New C-Suite Positions
Products and Releases  |  2/21/2019  | 
Organizational changes fuel the next stage of growth for leading third-party risk platform provider.
R-CISC Changes Name to Retail and Hospitality ISAC
Products and Releases  |  2/21/2019  | 
Name change and 2019 plans reflect expanded membership and include additional staff, focused reports, new workshops.
Report Details AI and ML Cybersecurity Arms Race
Products and Releases  |  2/20/2019  | 
Aite Group report finds that machine learning-powered cybersecurity solutions are becoming must-haves for threat detection and response.
Cyber and Physical Convergence is Creating New Attack Opportunities for Cybercriminals
Products and Releases  |  2/20/2019  | 
The Fortinet threat landscape report reveals half of top 12 global exploits targeted IoT devices.
DIGITAL GUARDIAN NAMES MORDECAI ROSEN AS CEO
Products and Releases  |  2/20/2019  | 
Former Head of Cybersecurity at CA Technologies Takes the Reigns at Leading Data and Endpoint Protection Company
nsKnox Raises $15M Led by Viola Ventures & M12, Microsofts Venture Fund, to Meet Demand for Corporate Payment Protection
Products and Releases  |  2/19/2019  | 
Rising cybercrime sophistication and magnitude spurs demand for new technologies to protect against manipulations and fraud.
Hysolate Extends Cybersecurity Isolation Platform
Products and Releases  |  2/14/2019  | 
Platform extensions protect enterprise endpoints from cyberattacks while improving end-user productivity
Blue Hexagon Announces Real-Time, Deep Learning Platform for Network Threat Protection
Products and Releases  |  2/14/2019  | 
The company emerges from stealth with $31 million from Benchmark and Altimeter to transform how cyberthreats are detected and thwarted.
New Report: Toward AI Security: Global Aspirations for a More Resilient Future
Products and Releases  |  2/13/2019  | 
Research from the Center for Long-Term Cybersecurity provides comparative analysis of different nations strategic plans for artificial intelligence.
GBG acquires Atlanta-based IDology for $300 Million
Products and Releases  |  2/13/2019  | 
The acquisition will expand UK-based GBG's global identity verification and fraud prevention capability in a key growth market.
Veriato to Offer Cerebral, Insider Threat Intelligence Platform
Products and Releases  |  2/13/2019  | 
60 percent of cyber attacks are carried out by insiders and the average cost of an Insider Threat is approaching $9 million
Tripwire IP360 Now Discovers More Than 200,000 Conditions
Products and Releases  |  2/13/2019  | 
vulnerability management solution Tripwire IP360 now discovers more than 200,000 conditions, including vulnerabilities, configurations, applications and operating systems.
Illumio Raises $65M and Expands Leadership Team With New CFO and Board Director Appointment
Products and Releases  |  2/13/2019  | 
Leading micro-segmentation company furthers global expansion, hires Anup Singh as CFO, and appoints John Hinshaw to Board of Directors
Fortanix Raises $23M Led by Intel Capital to Meet Growing Global Demand for Runtime Encryption Solutions Protecting Cloud Data
Products and Releases  |  2/12/2019  | 
Fortanix and Intel Working Together to Address Cloud Security and Data Privacy Problem by Providing Secure Enclaves and Key Management Protection in the Cloud
Axonius Raises $13 Million Series A
Products and Releases  |  2/12/2019  | 
Bessemer leads round to help cybersecurity asset management leader accelerate growth and product innovation; Amit Karp joins board of directors
Attivo Networks Introduces The Informer, a Deception-based Forensic Collection Solution
Products and Releases  |  2/12/2019  | 
Enhancement to ThreatDefend Platform Delivers Adversary Intelligence, Dramatically Reducing a Defenders Response and Remediation Time
ShiftLeft Raises $20 Million Series B Funding to Accelerate Adoption of Automated Application Security
Products and Releases  |  2/12/2019  | 
Thomvest leads round with participation from Sinewave, Bain Capital Ventures and Mayfield; new advisory board includes prominent members of security and development community
Qualys Releases Global IT Asset Inventory Cloud App
Products and Releases  |  2/11/2019  | 
The app is designed to deliver visibility and a source of truth for security and IT teams.
Page 1 / 2   >   >>


It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.