Products and Releases

Latest Content
Page 1 / 2   >   >>
DH2i Launches DxOdyssey for Zero Trust Hybrid/Multi-Cloud Security
Products and Releases  |  11/6/2018  | 
DH2i introduces new software-defined perimeter (SDP) product.
Shape Security Raises $26M Round
Products and Releases  |  11/1/2018  | 
Round Led by Norwest Venture Partners, Joined by JetBlue Technology Ventures and Singtel Innov8, brings Shapes total raised to $132M
UC Berkeley Launches Cybersecurity "Citizen Clinic"
Products and Releases  |  10/31/2018  | 
New program will train students to provide sustainable cybersecurity assistance to politically vulnerable organizations
Arctic Wolf Lands $45 Million in New Funding to Accelerate Company Growth
Products and Releases  |  10/30/2018  | 
Amidst Rapid Growth and Market Interest, SOC-as-a-Service Provider Plans for Expanded Offerings with New Products and Strategic Acquisitions
Explosive IoT Growth Slowed by 'Early Adopter Paradox'
Products and Releases  |  10/25/2018  | 
Extensive multi-year F-Secure consumer survey finds the consumers most excited about connected home devices are also most aware of the privacy risks
Check Point Software to Acquire Dome9
Products and Releases  |  10/24/2018  | 
Acquisition will strengthen Check Points position in Cloud Security
Smarsh Survey Reveals Financial Firms Looking for Communications Risks in the Wrong Places
Products and Releases  |  10/19/2018  | 
Eighth annual report finds organizations need to place a greater emphasis on modern workforce communications channels Including mobile and social media
60% of IT Security Professionals Looking to Leave Current Job: Mondo
Products and Releases  |  10/18/2018  | 
Top reasons for leaving are tied between lack of growth opportunities and job satisfaction, the tech recruiter reports.
The Chertoff Group Announces Rebrand
Products and Releases  |  10/16/2018  | 
The Chertoff Group gets a makeover, enhancing its reputable service practices with new core offerings, new website, new logo, and new podcast.
New RiskRecon Asset Risk Valuation Algorithms Manage Third-Party Cyber Risk
Products and Releases  |  10/15/2018  | 
New algorithms solve the cyber risk equation by automatically determining the risk value of computer systems, enabling precise cyber risk assessment and action.
Study: 77% of CISOs Receive Conflicting Advice About Changing Regulation
Products and Releases  |  10/11/2018  | 
New study highlights key cybersecurity industry trends and insights on data privacy regulation.
Shujinko Raises $2.8 Million to Address Cloud Security Compliance
Products and Releases  |  10/11/2018  | 
Unusual Ventures, Defy, Vulcan Capital, PSL Ventures and Vas Ventures invested in the Seattle-based startup, with participation from key angels in the security and cloud space.
AppRiver Acquires Total Defense
Products and Releases  |  10/10/2018  | 
Second acquisition of 2018 strengthens AppRivers position as a global leader in security and productivity solutions for small and mid-sized businesses
Akamai Announces Platform Enhancements Designed to Bolster Security
Products and Releases  |  10/10/2018  | 
Adds intelligent security automation, advanced threat protection for web apps, deeper real-time insights, and improved efficiencies to the edge
Symantec Expands Cloud Security Portfolio
Products and Releases  |  10/10/2018  | 
Integrated approach to cloud security, compliance and management delivers no compromises visibility and control to IaaS, PaaS and SaaS applications
Romanian National Accused of Leading Intl. Fraud Operation Behind $4M Theft
Products and Releases  |  10/10/2018  | 
The cyber fraud ring allegedly used malware to steal $4M after taking users' passwords and personal data, the DoJ reports.
Cryptomining Dethrones Ransomware as Top Threat in 2018: Webroot
Products and Releases  |  10/10/2018  | 
Webroot also saw phishing attempts increase by more than 60 percent.
Information Security Forum Releases Standard of Good Practice 2018
Products and Releases  |  10/3/2018  | 
All-in-One guide used by global organizations as primary reference for information security best practices
Lockpath and BitSight Announce Partnership to Strengthen Cyber Security Risk Programs
Products and Releases  |  10/3/2018  | 
The new integration focuses on managing security risk from third and fourth parties.
Mimecast Announces Web Security
Products and Releases  |  10/2/2018  | 
75% Of Organizations Lack Complete Confidence That Their Security Defenses Will Stop Targeted Spear-Phishing With Malicious Web Links
Department of Energy Invests $28 Million to Advance Cybersecurity of the Nations Critical Energy Infrastructure
Products and Releases  |  10/2/2018  | 
Funding to Support the Creation of More Resilient Energy Delivery Systems
Endace Launches Petabyte Network Recording Appliance
Products and Releases  |  10/1/2018  | 
Appliance includes new capabilities for security and performance analytics, with a 5x increase in storage density, 40Gbps recording, and increased analytics throughput.
Belden and Claroty Announce Strategic Partnership
Products and Releases  |  10/1/2018  | 
Companies Deliver First-of-its-Kind Integrated Cybersecurity Solution for Deep, End-to-End Visibility and Real-Time Monitoring Across Industrial Networks
Digital Shadows Launches Shadow Search
Products and Releases  |  9/27/2018  | 
Service enables organizations to self-serve and find cyber threats against them from the open, deep and dark web
Blue Cedar Teams Up with OpenSSL, Akamai, NetApp, VMware to Build Next-Gen FIPS Module
Products and Releases  |  9/27/2018  | 
New FIPS Module for OpenSSL will democratize access to widely used cryptographic library.
Forter, Fraud Prevention Technology Firm, Raises $50M
Products and Releases  |  9/27/2018  | 
The Series D Round will be used to expand Forters e-commerce fraud prevention platform, leveraging its accelerated merchant adoption.
Cloudflare Launches Domain Registrar
Products and Releases  |  9/27/2018  | 
Secure domain registration announced.
FIDO2 Certified Solutions Ship
Products and Releases  |  9/27/2018  | 
FIDO2 authentication standards enable websites to replace vulnerable passwords with cryptographically secure logins using convenient alternatives like biometrics and security keys
Industrial Cybersecurity Leader Nozomi Networks Raises $30 Million
Products and Releases  |  9/27/2018  | 
With total funding at $54M, Nozomi Networks accelerates growth, extends leadership in ICS cyber security
Snyk raises $22 million Series B led by Accel to automatically fix vulnerable open source packages
Products and Releases  |  9/25/2018  | 
Funding to scale Snyks developer-first offering and build runtime malicious package protection
Verizon Digital Media Services adds managed security services to its cloud solution for enterprises
Products and Releases  |  9/24/2018  | 
New offering is available as part of a suite of security services including a dual web application firewall, DDoS protection, bot management, and real-time analytics and reporting.
CrowdStrike and Secureworks Form Partnership to Integrate Secureworks Red Cloak Behavioral Analytics with CrowdStrikes Endpoint Protection Platform
Products and Releases  |  9/17/2018  | 
CrowdStrike signs on as an inaugural participant in Secureworks new Red Cloak Partner Program
World-renowned Cybersecurity Veteran Richard Bejtlich Joins Corelight as Principal Security Strategist
Products and Releases  |  9/13/2018  | 
Bejtlich brings key industry perspectives and insights on network visibility and data-centric security that will help Corelight customers, and drive sales and product development strategy
Appdome Releases Two New Mobile App Security Protections
Products and Releases  |  9/12/2018  | 
New industry-first capabilities protection mobile communications & the underlying mobile app
Varonis Announces Interoperability with RSA Identity Governance and Lifecycle
Products and Releases  |  9/12/2018  | 
Interoperability enables detection and mitigation of security risks by providing centralized management and control of sensitive data
ThreatConnect Now Integrates with Dragos Worldview Intelligence
Products and Releases  |  9/11/2018  | 
Security teams can act efficiently to identify malicious actors targeting worldwide industrial networks
Corelight Secures $25 Million in Series B Funding Led by General Catalyst
Products and Releases  |  9/11/2018  | 
Former VMware CTO Steve Herrod joins board as Corelight continues to build momentum with its leading network visibility platform
Global Report Card Survey Reveals Cybersecurity Program Trends Since 2017
Products and Releases  |  9/11/2018  | 
GPAs are on the rise with security pros feeling more confident than ever before; Automation and training are key to getting an A grade.
SecurityMatters Announces ICS Patrol for Network Visibility, Compliance and Control
Products and Releases  |  9/10/2018  | 
SecurityMatters ICS Patrol advances operational management and cybersecurity for critical infrastructure by providing asset visibility for enterprise-grade deployments.
Page 1 / 2   >   >>


Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Why the CISSP Remains Relevant to Cybersecurity After 28 Years
Steven Paul Romero, SANS Instructor and Sr. SCADA Network Engineer, Chevron,  11/6/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16850
PUBLISHED: 2018-11-13
postgresql before versions 11.1, 10.6 is vulnerable to a to SQL injection in pg_upgrade and pg_dump via CREATE TRIGGER ... REFERENCING. Using a purpose-crafted trigger definition, an attacker can cause arbitrary SQL statements to run, with superuser privileges.
CVE-2018-17187
PUBLISHED: 2018-11-13
The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options...
CVE-2018-1792
PUBLISHED: 2018-11-13
IBM WebSphere MQ 8.0.0.0 through 8.0.0.10, 9.0.0.0 through 9.0.0.5, 9.0.1 through 9.0.5, and 9.1.0.0 could allow a local user to inject code that could be executed with root privileges. IBM X-Force ID: 148947.
CVE-2018-1808
PUBLISHED: 2018-11-13
IBM WebSphere Commerce 9.0.0.0 through 9.0.0.6 could allow some server-side code injection due to inadequate input control. IBM X-Force ID: 149828.
CVE-2018-15452
PUBLISHED: 2018-11-13
A vulnerability in the DLL loading component of Cisco Advanced Malware Protection (AMP) for Endpoints on Windows could allow an authenticated, local attacker to disable system scanning services or take other actions to prevent detection of unauthorized intrusions. To exploit this vulnerability, the ...