Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Latest Content
Page 1 / 2   >   >>
New Research Indicates 84% of Businesses Will Likely Increase Work-from-Home Capacity Beyond Pandemic Despite Security Concerns
Products and Releases  |  5/27/2020  | 
IT decision-makers to expand work-from-home initiatives as two-thirds prepare for increased malware, phishing, and unauthorised user and device access exposures.
Smarsh Acquires Entreda, Leader in Cybersecurity Risk & Compliance Software for Wealth Management Industry
Products and Releases  |  5/21/2020  | 
Smarsh to Expand Product Offerings to Encompass Award-Winning Cybersecurity Risk and Compliance Solutions.
FireEye Endpoint Security: Introducing Innovation Architecture for Rapid Deployment of Advanced Capabilities
Products and Releases  |  5/21/2020  | 
Enables organizations to respond to security incidents more quickly with flexible and customizable modules.
Avanan Introduces Cloud-based Security for Citrix ShareFile
Products and Releases  |  5/20/2020  | 
Avanan's new set of capabilities expands its coverage of cloud-based platforms.
Varonis Announces New Platform Update Featuring Remote Work Cybersecurity Capabilities
Products and Releases  |  5/20/2020  | 
Updates to the Varonis Data Security Platform help enterprises better secure their remote workforces with greater visibility and threat detection related to VPN and data access activity.
Telos Appoints General Keith Alexander as Inaugural Member of Advisory Board
Products and Releases  |  5/20/2020  | 
General Alexander will serve as a strategic partner and provide counsel on key cybersecurity objectives and initiatives.
Accurics' 'State of DevSecOps Report' Highlights Shift Toward Provisioning Cloud Infrastructure Through Code
Products and Releases  |  5/20/2020  | 
Report analyzes current cloud-security approaches and outlines best practices.
FTI Consulting Survey Shares Data Privacy Budget and Solutions Forecast
Products and Releases  |  5/19/2020  | 
Data privacy spend to grow by more than 50%; most organizations plan to increase focus on privacy compliance in coming year.
FireEye Announces Availability of FireEye Cloudvisory
Products and Releases  |  5/18/2020  | 
Cloudvisory is a cloud-native security solution that gives security teams unified control over cloud sprawl and infrastructure misconfiguration.
EmberSec Unveils Virtual CISO Program
Products and Releases  |  5/18/2020  | 
Program provides deep risk management and cybersecurity expertise.
wolfSSL Releases Version 4.4.0 of Embedded TLS Library wolfSSL
Products and Releases  |  5/18/2020  | 
Also announces updates to related products.
Security Industry Association Announces New SIA Women in Security Forum Scholarship Opportunity
Products and Releases  |  5/14/2020  | 
SIA INVITES EMPLOYEES OF MEMBER COMPANIES AND SIA STUDENT MEMBERS TO APPLY FOR THIS NEW PROGRAM DESIGNED TO FURTHER EDUCATIONAL OPPORTUNITIES AND PROMOTE ADVANCEMENT FOR A DIVERSE SECURITY WORKFORCE.
FBI, CISA: Cyber Actors Targeting COVID-19-Related Research
Products and Releases  |  5/14/2020  | 
Potential theft jeopardizes delivery of secure, effective, and efficient treatment options.
Digital Fraudsters Increase Attacks Against Multiple Industries During Pandemic
Products and Releases  |  5/13/2020  | 
TransUnion quarterly global fraud analysis also examines the types of fraud targeting businesses and where it originates.
Coronavirus-Related Cyber Attacks Jump 30%
Products and Releases  |  5/13/2020  | 
Check Point Researchers document 192,000 coronavirus-related cyberattacks a week, citing impersonations of WHO, UN, and Zoom.
Survey: Data Sharing in the Cloud Puts Education Sector at Risk
Products and Releases  |  5/12/2020  | 
Netwrix survey reveals that employees at 54% of educational organizations use cloud applications to share sensitive data outside of IT control and knowledge.
Cisco Fixes Vulnerabilities in ASA Firewall Found by Positive Technologies
Products and Releases  |  5/8/2020  | 
Exploitation of these vulnerabilities could have prevented VPN connection or allowed attackers to penetrate corporate networks.
Dtex Raises $17.5 Million in Funding
Products and Releases  |  5/7/2020  | 
Funding, led by Northgate Capital, will be used to expand insider threat cybersecurity company's market presence.
MITRE Engenuity Announces ATT&CK Evaluations for ICS Vendors
Products and Releases  |  5/7/2020  | 
Evaluations to Focus on Malware Capable of Physical Damage
Research: Women Are Better at Cybersecurity Than Men
Products and Releases  |  5/7/2020  | 
NordPass survey reveals that women do more to protect themselves online.
Cyber Warning Issued for Key Healthcare Organizations in UK and USA
Products and Releases  |  5/5/2020  | 
Organizations targeted in large-scale "password spraying" campaigns.
Blackblaze Releases S3 Compatible APIs
Products and Releases  |  5/5/2020  | 
More than a dozen software companies have committed their support.
Privitar Announces New Native Integration with Google Cloud Platform
Products and Releases  |  5/5/2020  | 
New integration enables users to seamlessly protect and extract maximum value from sensitive personal data, rounds out Privitar's support of public cloud services.
APT Actors Shift to Mobile During Q1
Products and Releases  |  5/4/2020  | 
Kaspersky research also shows increased activity in Asia.
MobileIron Acquires incapptic Connect to Accelerate App Release Journey for Enterprise Customers
Products and Releases  |  4/30/2020  | 
MobileIrons unified endpoint management (UEM) platform integrates with incapptic Connect software to help customers quickly develop, deploy and secure business apps.
BakerHostetlers 2020 Data Security Incident Response Report Shows Phishing Still No. 1 Cause of Data Incidents, Ransomware Attacks on the Rise
Products and Releases  |  4/30/2020  | 
Firms sixth annual report shares insights and statistics from more than 950 incidents managed in 2019
Americans Find Password Management as Stressful as Retirement
Products and Releases  |  4/29/2020  | 
New research by NordPass explores peoples password managing habits.
Imperva Launches General Availability of Advanced Bot Protection Solution
Products and Releases  |  4/27/2020  | 
Industry-best solution introduces next-generation code obfuscation Morpheme, making reverse engineering more difficult for sophisticated bot operators.
Malwarebytes Expands Into Privacy with Fast, Frictionless VPN
Products and Releases  |  4/27/2020  | 
Cybersecurity leader puts consumers in control of their privacy with next-generation VPN.
Kaspersky to Remotely Support Weakly Connected Point-of-Sale Devices
Products and Releases  |  4/27/2020  | 
The company also introduces Network Threat Protection to improve ATM and PoS security posture against attacks.
RangeForce Signs Distribution Agreement with Tech Data
Products and Releases  |  4/23/2020  | 
Agreement provides simulation-based cybersecurity training and crisis preparation for cyber teams.
MITRE Releases Results of Evaluations of 21 Cybersecurity Products
Products and Releases  |  4/23/2020  | 
Using its ATT&CK knowledge base, MITRE emulated the tactics and techniques of APT29.
Abnormal Security Protects Remote Workforces from Social Engineering Attacks with Cloud Email Security Integrations
Products and Releases  |  4/23/2020  | 
API-Based Integration with Microsoft Teams and Okta Multi-Factor Authentication Extends Security Coverage Beyond Email to Provide End-to-End Channel Protection.
Cybrary Announces New Scholars Program to Support Professionals Impacted by COVID-19
Products and Releases  |  4/22/2020  | 
Program to offer a year of free online IT/cyberskills training and professional mentorship.
Fortanix Integrates Cloud Native Applications with Legacy HSMs in New Hybrid Cloud Data Security Solution
Products and Releases  |  4/22/2020  | 
Company also announces Fortanix Legacy HSM Replacement Program.
Securing Endpoints a Top Concern and Challenge in Reducing Attack Dwell Times: Research
Products and Releases  |  4/20/2020  | 
Respondents rank detection controls and cite cyber deception as the top attack disrupter among a range of traditional solutions.
Awake Security Raises Series C Investment to Fuel Expansion & Adoption of Its Advanced Network Traffic Analysis Platform
Products and Releases  |  4/15/2020  | 
Evolution Equity Partners Leads Oversubscribed Round with Participation from Energize Ventures, Liberty Global Ventures, as well as Existing Investors Bain Capital Ventures and Greylock Partners.
Corsa Security Orchestrator Simplifies Scaling of Traffic Inspection
Products and Releases  |  4/15/2020  | 
Application provides intelligent orchestration and management of virtual Next Generation Firewall arrays
NeuVector Releases Vulnerability Management Tools That Strengthen & Automate End-to-End Container Security
Products and Releases  |  4/14/2020  | 
Now part of the NeuVector platform, enterprise DevOps and security teams get the Vulnerability and Compliance Explorer, a high-performance scanner, and enhanced host protection
Study: Preventing Cyberattack Penetration Can Save Enterprises Up to $1.4 Million Per Incident
Products and Releases  |  4/14/2020  | 
Ponemon Institute finds that 70% of security professionals believe the ability to effectively prevent cyberattack penetration strengthens their security posture, yet only 24% are focused on optimizing prevention capabilities.
CISA Releases TIC 3.0 Interim Telework Guidance
Products and Releases  |  4/10/2020  | 
Information intended to aid agencies in securing their network and cloud environments.
Theta Lake Offers Three Free Months of AI-based Safety and Compliance for Zoom Customers
Products and Releases  |  4/7/2020  | 
The offering aims to provide risk and compliance management for rapid growth in Zoom usage.
RiskSense Introduces Full Spectrum Risk-Based Vulnerability Management
Products and Releases  |  3/31/2020  | 
Cloud solution automatically discovers, analyzes, scores, and prioritizes both internal and external-facing security threat exposure across an organizations IT infrastructure and applications.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4231
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an authenticated user to perform unauthorized commands due to hazardous input validation. IBM X-Force ID: 175335.
CVE-2020-4232
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an attacker to enumerate usernames to find valid login credentials which could be used to attempt further attacks against the system. IBM X-Force ID: 175336.
CVE-2020-4233
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow a remote attacker to obtain sensitive information, caused by the failure to set the secure flag for the session cookie in SSL mode. By intercepting its transmission within an HTTP session, an attacker could exploit this vulnerabilit...
CVE-2020-4244
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 could allow an unauthorized user to obtain sensitive information through user enumeration. IBM X-Force ID: 175422.
CVE-2020-4245
PUBLISHED: 2020-05-28
IBM Security Identity Governance and Intelligence 5.2.6 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 175423.