Products and Releases

Latest Content
Page 1 / 2   >   >>
Report Details AI and ML Cybersecurity Arms Race
Products and Releases  |  2/20/2019  | 
Aite Group report finds that machine learning-powered cybersecurity solutions are becoming must-haves for threat detection and response.
Cyber and Physical Convergence is Creating New Attack Opportunities for Cybercriminals
Products and Releases  |  2/20/2019  | 
The Fortinet threat landscape report reveals half of top 12 global exploits targeted IoT devices.
DIGITAL GUARDIAN NAMES MORDECAI ROSEN AS CEO
Products and Releases  |  2/20/2019  | 
Former Head of Cybersecurity at CA Technologies Takes the Reigns at Leading Data and Endpoint Protection Company
nsKnox Raises $15M Led by Viola Ventures & M12, Microsofts Venture Fund, to Meet Demand for Corporate Payment Protection
Products and Releases  |  2/19/2019  | 
Rising cybercrime sophistication and magnitude spurs demand for new technologies to protect against manipulations and fraud.
Hysolate Extends Cybersecurity Isolation Platform
Products and Releases  |  2/14/2019  | 
Platform extensions protect enterprise endpoints from cyberattacks while improving end-user productivity
Blue Hexagon Announces Real-Time, Deep Learning Platform for Network Threat Protection
Products and Releases  |  2/14/2019  | 
The company emerges from stealth with $31 million from Benchmark and Altimeter to transform how cyberthreats are detected and thwarted.
New Report: Toward AI Security: Global Aspirations for a More Resilient Future
Products and Releases  |  2/13/2019  | 
Research from the Center for Long-Term Cybersecurity provides comparative analysis of different nations strategic plans for artificial intelligence.
GBG acquires Atlanta-based IDology for $300 Million
Products and Releases  |  2/13/2019  | 
The acquisition will expand UK-based GBG's global identity verification and fraud prevention capability in a key growth market.
Veriato to Offer Cerebral, Insider Threat Intelligence Platform
Products and Releases  |  2/13/2019  | 
60 percent of cyber attacks are carried out by insiders and the average cost of an Insider Threat is approaching $9 million
Tripwire IP360 Now Discovers More Than 200,000 Conditions
Products and Releases  |  2/13/2019  | 
vulnerability management solution Tripwire IP360 now discovers more than 200,000 conditions, including vulnerabilities, configurations, applications and operating systems.
Illumio Raises $65M and Expands Leadership Team With New CFO and Board Director Appointment
Products and Releases  |  2/13/2019  | 
Leading micro-segmentation company furthers global expansion, hires Anup Singh as CFO, and appoints John Hinshaw to Board of Directors
Fortanix Raises $23M Led by Intel Capital to Meet Growing Global Demand for Runtime Encryption Solutions Protecting Cloud Data
Products and Releases  |  2/12/2019  | 
Fortanix and Intel Working Together to Address Cloud Security and Data Privacy Problem by Providing Secure Enclaves and Key Management Protection in the Cloud
Axonius Raises $13 Million Series A
Products and Releases  |  2/12/2019  | 
Bessemer leads round to help cybersecurity asset management leader accelerate growth and product innovation; Amit Karp joins board of directors
Attivo Networks Introduces The Informer, a Deception-based Forensic Collection Solution
Products and Releases  |  2/12/2019  | 
Enhancement to ThreatDefend Platform Delivers Adversary Intelligence, Dramatically Reducing a Defenders Response and Remediation Time
ShiftLeft Raises $20 Million Series B Funding to Accelerate Adoption of Automated Application Security
Products and Releases  |  2/12/2019  | 
Thomvest leads round with participation from Sinewave, Bain Capital Ventures and Mayfield; new advisory board includes prominent members of security and development community
Qualys Releases Global IT Asset Inventory Cloud App
Products and Releases  |  2/11/2019  | 
The app is designed to deliver visibility and a source of truth for security and IT teams.
CrowdStrike Opens Endpoint Protection Platform to Third-party Applications
Products and Releases  |  2/8/2019  | 
The CrowdStrike Store delivers single-cloud experience to the security industry to improve the security stack and threat protection.
Social Engineering, Credential Compromise Jumped in 2018: Proofpoint
Products and Releases  |  1/25/2019  | 
Cybercriminals continue to target end users, requiring a people-centric security approach and demonstrating the importance of security awareness training.
nCipher Security Launches
Products and Releases  |  1/24/2019  | 
Newly formed organization preserves competition and ensures continued innovation in general purpose HSM market
Overlooked and Underappreciated? IT Security Professionals are Suffering from an Image Problem
Products and Releases  |  1/24/2019  | 
New Research from Thycotic reveals IT security professionals feel theyre seen as the doom mongers or a necessary evil by employees
Aspen Tech Policy Hub Launches Inaugural Fellowship Program
Products and Releases  |  1/18/2019  | 
New West Coast Initiative from the Aspen Institute Will Engage Technologists in Policymaking
Syncsort Survey Finds Disconnect Between Confidence in IT Security Programs and Data Breaches
Products and Releases  |  1/18/2019  | 
Despite an Optimistic Security Outlook, 61 Percent of Organizations Report They Have Either Experienced a Security Breach or Arent Sure
Trend Micro Rolls Out IoT Security 2.0
Products and Releases  |  1/9/2019  | 
Latest version of IoT security platform improves protection, visibility and control
FireEye Updates Email Security with New Threat Detection and Evasion Defenses Based on Insights from the Front Lines
Products and Releases  |  1/9/2019  | 
On-premises email enhancements include executive impersonation protection, expanded URL protection, a new machine learning engine to detect emerging threats, password-protected image analysis, and guest image customization
Nuspire Launches Managed Detection And Response Solution With Three Detection And Response Services
Products and Releases  |  1/7/2019  | 
Nuspires MDR solution to provide EDR, NDR and XDR services that detects and protects against malicious threats
Harris Poll Reveals American Attitudes Towards Cybersecurity and Privacy
Products and Releases  |  12/19/2018  | 
Harris Poll Reveals American Attitudes Towards Cybersecurity and Privacy
Don Cardinal Named Head of Financial Data Exchange
Products and Releases  |  12/18/2018  | 
Digital banking and cybersecurity specialist will lead industry group focused on simplifying and standardizing financial data-sharing
Avanan Raises $25 Million
Products and Releases  |  12/17/2018  | 
CrowdStrike Part of MITRE ATT&CK Product Evaluation
Products and Releases  |  12/10/2018  | 
Trend Micro Research Uncovers Major Flaws in Leading IoT Protocols 12/4/18 7:00 am CST
Products and Releases  |  12/4/2018  | 
Hundreds of thousands of unsecured machine-to-machine deployments put global organizations at risk
Application Security for AWS Lambda Customers
Products and Releases  |  11/29/2018  | 
Venafi Secures $100M Financing Round Led by TCV
Products and Releases  |  11/29/2018  | 
New funding to accelerate growth and support new Machine Identity Protection Development Fund.
More Than Half of Companies See Rise in Mobile Security Threats: Bitglass 2018 BYOD Report
Products and Releases  |  11/27/2018  | 
43 percent of firms do not know if devices accessing corporate data have downloaded malware.
King & Union and Farsight Security Announce Strategic Partnership
Products and Releases  |  11/19/2018  | 
Seamless Integration Allows Security Teams to Improve Collaboration, Automation and Threat Visualization
BSIA to create UK marketplace for all IFSEC Global Shows
Products and Releases  |  11/19/2018  | 
Dragos Announces $37M in Series B Funding for Industrial Control Systems (ICS) Cybersecurity Threat Detection and Response
Products and Releases  |  11/16/2018  | 
Funding led by Canaan will accelerate growth in Dragos' ICS cybersecurity software platform, threat intelligence, and threat operations services
Trend Micro and Moxa Announce Letter of Intent for Joint Venture to Tackle Security Needs In Industrial IoT Environments
Products and Releases  |  11/15/2018  | 
Demand for increased protection where IT meets OT drives decision to form new company
Global Cooperation And Regulation Key In Addressing Multilayered Threats Posed By New Technology
Products and Releases  |  11/15/2018  | 
Challenges remain in safeguarding the principles of a free and open internet, but agreement on multilateral and multidisciplinary approaches remain
Eurofins Digital Testing Launches Cyber Security Division
Products and Releases  |  11/14/2018  | 
Expands testing capabilities to serve TV operators, broadcasters, content companies, device manufacturers, and others in Europe and around the globe
New Research from eSentire Finds Only 30 Percent of Firms are Confident They Can Avoid a Major Security Event in the Next Two Years
Products and Releases  |  11/14/2018  | 
Online Business Risk Index Tool unveiled to help firms identify their own key risk and steps to improve security maturity
Nok Nok Labs Introduces Strong Account Recovery
Products and Releases  |  11/14/2018  | 
Latest version of NNL S3 Suite is one of the first to enable customers to globally manage ID proofing from a single platform and provides account recovery features and alternatives
Page 1 / 2   >   >>


High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3474
PUBLISHED: 2019-02-20
A path traversal vulnerability in the web application component of Micro Focus Filr 3.x allows a remote attacker authenticated as a low privilege user to download arbitrary files from the Filr server. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-3475
PUBLISHED: 2019-02-20
A local privilege escalation vulnerability in the famtd component of Micro Focus Filr 3.0 allows a local attacker authenticated as a low privilege user to escalate to root. This vulnerability affects all versions of Filr 3.x prior to Security Update 6.
CVE-2019-10030
PUBLISHED: 2019-02-20
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.52 and earlier in RejectASTTransformsCustomizer.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM.
CVE-2019-10030
PUBLISHED: 2019-02-20
A exposure of sensitive information vulnerability exists in Jenkins Cloud Foundry Plugin 2.3.1 and earlier in AbstractCloudFoundryPushDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through anoth...
CVE-2019-10030
PUBLISHED: 2019-02-20
A server-side request forgery vulnerability exists in Jenkins Mattermost Notification Plugin 2.6.2 and earlier in MattermostNotifier.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified Mattermost server and room and send a message.