Products and Releases

Latest Content
Page 1 / 2   >   >>
IGEL Integrates Endpoint Computing Solutions With deviceTRUST
Products and Releases  |  12/14/2017  | 
Through dynamic contextual awareness, corporate data remains secure and compliance and regulatory requirements are met when end-users roam between IGEL OS-powered endpoint devices.
CyberX Adds Secure Remote Access Integration for Critical Industrial Networks
Products and Releases  |  12/14/2017  | 
New privileged account security integration reduces risk of unauthorized access to control networks.
Leidos Partners with SecurityMatters for Passive Monitoring of Cyber Threats
Products and Releases  |  12/14/2017  | 
Monitoring will focus on industrial control systems networks.
IRS Warns Taxpayers, Tax Pros of New Email Scam Targeting Hotmail Users
Products and Releases  |  12/13/2017  | 
New phishing email scam targets Hotmail users using IRS as bait.
Pwnie Express Secures $8 Million in New Funding
Products and Releases  |  12/13/2017  | 
Company names Todd DeSisto as new CEO.
Upstream Security Secures $9 Million Series A Funding Round
Products and Releases  |  12/13/2017  | 
Focuses on ramping up its cloud-based cybersecurity for connected and autonomous car fleets.
Dev/Con Detect Launches Ad Tech Industry Fraud Detection, Prevention
Products and Releases  |  12/11/2017  | 
Startup lands $1.29mm in seed round funding.
VMware and Carbon Black Team Up in Data Center and Cloud Security
Products and Releases  |  12/7/2017  | 
New joint, cloud-based security solution combines enforcement of 'known good' application behavior with advanced threat detection and automated remediation
Phantom.me App Supports International Right to Privacy by Protecting Mobile Phone Activity
Products and Releases  |  12/6/2017  | 
In conjunction with Human Rights Day, company invites NGOs to apply for free use of the app
Coronet Announces SecureCloud - A New Approach to Cloud Security
Products and Releases  |  12/5/2017  | 
Democratizes Enterprise-Grade Security for SMEs and Drives TCO Down to One-Tenth the Cost of Traditional Cloud Security Infrastructure.
Ivanti Automates Device Isolation and Remediation to Further Operationalize a Defense-in-Depth Security Strategy
Products and Releases  |  12/4/2017  | 
Integrated Console and Workflows Enable Actions and Policies to be Applied to Any Mix of Device Types, Enhancing Security Response and Remediation
Entrust Datacard Acquires Trustis Limited
Products and Releases  |  12/4/2017  | 
Acquisition provides Entrust Datacard with expanded regional capability to address identity and personal data protection and regulations
Gemalto Gives Google Cloud Platform Customers Flexible Encryption and Key Management Capabilities
Products and Releases  |  12/4/2017  | 
Google customers can use Gemaltos SafeNet Data Encryption Solutions to bring their own encryption keys to secure their sensitive data on the cloud.
ScaleFT Announces General Availability of its Zero Trust Access Fabric
Products and Releases  |  12/4/2017  | 
ScaleFT is the first company to deliver Googles BeyondCorp as a service - helping companies achieve their own Zero Trust security architecture.
How Secure are the Most Popular Crypto Currencies Mobile Apps?
Products and Releases  |  11/29/2017  | 
90% of tested cryptocurrency mobile apps in Google Play may be in trouble for common vulnerabilities and weaknesses.
Majority of Email 'From' Healthcare Industry is Fraudulent
Products and Releases  |  11/28/2017  | 
NH-ISAC Members Pledge Improved Security in Healthcare Industry; GCA Challenges All Organizations to Implement DMARC.
Secure Channels Releases Independent Peer Review on Encryption Protocol
Products and Releases  |  11/22/2017  | 
Secure independently validates patented PKMS2 encryption protocol
FireMon launches Intelligent Policy Automation for Cloud at AWS re:Invent 2017
Products and Releases  |  11/21/2017  | 
IPA for Cloud to reduce breaches attributed to security misconfigurations in the cloud.
Sensory, Fujitsu Partner to Bring Face Biometrics to Banking, Enterprise, Retail
Products and Releases  |  11/20/2017  | 
Sensorys TrulySecure face recognition technology offers safe and convenient user authentication without ever sending critical biometric data to the cloud.
prooV Enhances Proof-of-Concept Offering with Private Cloud for Attack Simulations
Products and Releases  |  11/15/2017  | 
prooV Red Cloud enables pressure-testing technologies against cyber threats before implementation and eliminates public cloud security roadblocks.
Skyport Systems Simplifies and Secures Edge Computing Environments
Products and Releases  |  11/14/2017  | 
SkySecures Cloud Native Architecture Based on Trusted Intel Platforms Brings Agility and Security to Skyports Edge Computing System.
Medigate Announces $5.35M Seed Round to Safeguard Connected Medical Devices
Products and Releases  |  11/14/2017  | 
Industrys first dedicated medical device security platform lets healthcare providers identify and secure inherently vulnerable medical devices.
Skyport Systems Simplifies and Secures Edge Computing Environments
Products and Releases  |  11/14/2017  | 
SkySecures Cloud Native Architecture Based on Trusted Intel Platforms Brings Agility and Security to Skyports Edge Computing System
FASTR consortium announces release of 'Automotive Industry Guidelines for Secure Over-the-Air Updates'
Products and Releases  |  11/10/2017  | 
Document provides evaluators with comprehensive, objective guidelines by which to analyze automotive software over-the-air (SOTA) update systems
Bomgar Offers Azure Deployment for Secure Access Solutions
Products and Releases  |  11/10/2017  | 
Deploys its virtual Remote Support and Privileged Access appliances in Microsoft Azure environments.
CrowdStrike Launches New Vulnerability Management Module
Products and Releases  |  11/10/2017  | 
Expands CrowdStrike Falcon platform capabilities with new vulnerability management module CrowdStrike Falcon Spotlight.
FIRST Announces Incident Response Training for Policymakers
Products and Releases  |  11/8/2017  | 
The Forum of Incident Response and Security Teams announces a training session on cyber security incident response for policymakers, policy analysts and government officials.
AllClear ID Launches the Breach Response Industrys First Customer Response War Game
Products and Releases  |  11/8/2017  | 
Predict the Success or Failure of Customer Response Plans Against Best and Worst Case Breach Scenarios
Recorded Future Expands Automated Threat Intelligence Solution with Analyst-Originated Intelligence
Products and Releases  |  11/8/2017  | 
Customers Now Have Access to On-Demand, In-Depth Intelligence From Expert Analysts
Widespread Mismanagement of Privileged Accounts and Access Revealed in One Identity Global Survey
Products and Releases  |  11/8/2017  | 
Nine in 10 respondents (88 percent) admit to challenges managing privileged passwords
Pulse Secure Offers Buy-1-Get-1-free on Next-Gen Hardware & Virtual Appliances
Products and Releases  |  11/8/2017  | 
Pulse Secure promotion helps organizations rapidly move from outdated Remote Access to Secure Access for the data center and cloud
Top 10 U.S. Colleges Battle at National Collegiate Penetration Testing Competition
Products and Releases  |  11/8/2017  | 
Offensive cybersecurity competition at RIT helps to build tomorrows cybersecurity experts
Contactless Payment, Tokenization and Card Not Present Fraud Mitigation Top US Payments Forum December Meeting Agenda
Products and Releases  |  11/7/2017  | 
Provides exceptional opportunity to gain insights into payment technology and trends, innovations and roadmaps from peers across all industry stakeholders
Blockchain for Wall Street Presents a Brains Trust of Experts on Blockchain and Cryptoassets in the Financial Markets
Products and Releases  |  11/7/2017  | 
Annual Education Day will provide answers to pressing Blockchain, Smart Contracts, Cryptoasset and ICO questions and concerns
Shape Security Releases AI System to Prevent Use of Compromised Credentials
Products and Releases  |  11/7/2017  | 
Shape Security introduces Blackfish artificial intelligence system to protect consumers whose passwords have been stolen in data breaches. New technology detects and prevents the use of compromised credentials even when data breaches are undiscovered or undisclosed.
Distil Networks Announces New JavaScript Deployment Option
Products and Releases  |  11/7/2017  | 
New method completes Distil Anywhere Architecture, giving enterprises ability to block bots via Secure CDN, in the data center, on AWS, on proprietary infrastructure, or through JavaScript integration
Page 1 / 2   >   >>


5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] Cloud Security's Changing Landscape
[Strategic Security Report] Cloud Security's Changing Landscape
Cloud services are increasingly becoming the platform for mission-critical apps and data. Heres how enterprises are adapting their security strategies!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.