Products and Releases
Latest Content
Page 1 / 2   >   >>
Report: IoT-Connected Devices Leading to Rise in SSDP-based Reflection Attacks
Products and Releases  |  4/24/2015  | 
NSFOCUS Report States Online Gaming and Entertainment Sectors Continue to be High on the Target List and Attackers Are Becoming More Sophisticated
LOGbinder updates its Exchange, SQL Server and SharePoint Solutions
Products and Releases  |  4/24/2015  | 
Security analysts now get mailbox audit policy configuration management, SQL Server 2014 compatibility, LEEF output, performance improvements
CERTES CRYPTOFLOW SOLUTIONS FOR IPHONE, IPAD NOW IN THE APP STORE
Products and Releases  |  4/23/2015  | 
Extends Enterprise Apps to Any User Over Any Network, Blocking #1 Data Breach Attack Vector
Leading MSPs Form Industry Consortium
Products and Releases  |  4/22/2015  | 
Free Remote Management and Monitoring with Integrated Professional Services Automation the Foundation of New Built-By-MSPs-For-MSPs Consortium
Bivio Networks Demonstrates Real-Time Cyber Intelligence Solution
Products and Releases  |  4/22/2015  | 
Bivio FlowIntelligence solution combines industry leading OISF Suricata IDS/IPS and Symantec DeepSight™ datafeeds to deliver advanced threat intelligence and analysis on high speed networks
UnitedLex Redefines Managed Security With Context-Aware Service
Products and Releases  |  4/22/2015  | 
Best-of-Breed Managed Security Service Provides Fortune 500 Caliber Security Capabilities to Medium-Sized Businesses
Rapid7 Announces Integration of its Intruder Analytics Solution with Microsoft Office 365 to Improve Security and Transparency
Products and Releases  |  4/21/2015  | 
UserInsight integrates with New Microsoft Office 365 Management Activity API, enabling organizations to identify and investigate intruders across the entire ecosystem, from endpoint to cloud RSA Conference USA 2015
INTEL EMPOWERS ORGANIZATIONS TO RECOGNIZE AND RESPOND TO CYBER-ATTACKS
Products and Releases  |  4/21/2015  | 
Intel Extends and Integrates Enterprise Portfolio with Greater Network and Endpoint Visibility and Control; Provides New Solutions for Application Layer Exfiltration Protection
Athena and Rambus Cryptography Research Division Announce Solutions to Prevent Advanced Security Threats
Products and Releases  |  4/21/2015  | 
TeraFire® Security IP Cores Are Now Shipping with DPA Countermeasures
Promisec Launches ‘Freemium’ Endpoint Monitoring Service
Products and Releases  |  4/21/2015  | 
Freemium Product Provides Critical MSSP/ OEM Support for Security Service Providers in Promisec’s Partners Program
ISSA-LA Holds 7th Annual Cybercrime Information Security Summit
Products and Releases  |  4/21/2015  | 
World Renowned Cybersecurity Experts Converge at Southern California's Biggest Security Conference
VMware to Resell HyTrust Data Encryption and Key Management
Products and Releases  |  4/21/2015  | 
Solutions Will Support Data Security and Compliance; Enable Enterprise Migration to Hybrid Cloud
Study Uncovers Fears of Potential Domino Effect from Cyberattacks
Products and Releases  |  4/21/2015  | 
While most C-level executives say cyberattacks can cause serious disruption to their own operation, many also express concerns about farther-reaching impact on the broader infrastructure at the local, state and national level
Watchful Software Showcases New Version of RightsWATCH at RSA
Products and Releases  |  4/21/2015  | 
Version 6.6 takes center stage at the RSA Conference at North Hall, booth #3026.
RSA Unveils Via™ Family of Smart Identity Solutions
Products and Releases  |  4/21/2015  | 
RSA Via™ Access: Engineered to Unite Security and Convenience in a SaaS-based Solution for Managing Access for Any User from Anywhere to Anything
RSA® Security Analytics Now Extends Visibility from the Endpoint to the Cloud
Products and Releases  |  4/21/2015  | 
New Flexible Packaging Helps Ensure Cost Effective, Enterprise-Wide Visibility for Customers
AlienVault to Work with HP on Cyber Threat-Sharing Initiative
Products and Releases  |  4/21/2015  | 
Effort to Broaden Reach of Threat Intelligence Sharing by Connecting Threat Data from HP Threat Central and AlienVault Open Threat Exchange
AS DATA BREACHES IN NEW YORK TRIPLE, GILLIBRAND ANNOUNCES BIPARTISAN CYBER SECURITY MEASURES
Products and Releases  |  4/21/2015  | 
Between 2006 and 2013, Number of Data Security Breaches Reported to NY Attorney General Tripled, Exposing 22.8 Million Personal Records
CloudLock Expands Cloud Security Offering for Salesforce
Products and Releases  |  4/21/2015  | 
CloudLock expanded product portfolio helps organizations to secure sensitive data in the cloud and protect corporate assets from cyber threats
Centrify Launches Industry’s First Cloud-based Privileged Identity Service
Products and Releases  |  4/21/2015  | 
Centrify Privilege Service Addresses Today’s Hybrid IT Environments of On-Premises and Cloud-based Systems as the Most Comprehensive Privileged Identity Solution on the Market Today
Core Security Solution Addresses Enterprise Vulnerability Management Issues
Products and Releases  |  4/21/2015  | 
New Features Include Interactive Attack Paths, Enhanced Exploit Matching and Filtering, Flexible Reporting and Smart Card Authentication
Lastline Knowledge Base of Malware Intelligence with String Indexing Launches at RSA
Products and Releases  |  4/21/2015  | 
Vast, Structured Repository Offers an Average of 10 Times More Data per Malware Query than Other Threat Intelligence Stores
Skyhigh announces fix for cloud security blind spot
Products and Releases  |  4/20/2015  | 
Gurucul Protects Cloud Apps with Identity-based Threat Detection
Products and Releases  |  4/20/2015  | 
Cloud Analytics Platform Detects Hijacked Accounts and Insider Abuse to Prevent Data Leakage and Compliance Violations
ThetaRay Protects Banks from Fraud, Money Laundering, ATM Attacks
Products and Releases  |  4/20/2015  | 
ACHIEVES BREAKTHROUGH IN DETECTION OF FRAUD, MONEY LAUNDERING, ATM ATTACKS AND ANOMALOUS TRANSACTIONS
New findings from 2015 North America DDoS report
Products and Releases  |  4/20/2015  | 
Survey shows heightened preparedness and adoption of hybrid technologies
Most Companies Lack Formal Policies to Manage Open Source Security Risks
Products and Releases  |  4/20/2015  | 
North Bridge and Black Duck Software announce ninth annual Future of Open Source survey results, revealing trends in corporate OSS use
Radware Introduces Industry’s First Hybrid Cloud Based WAF Service
Products and Releases  |  4/20/2015  | 
Radware launches new Hybrid Cloud WAF Service – a fully-managed service that provides unmatched protection from web application attacks.
GlobalSign expands mobile authentication support in its identity services platforms
Products and Releases  |  4/20/2015  | 
Enabling Organizations to Easily Deploy and Manage Identity for Everything™ With OAuth 2.0 for IAM, AirWatch Integration, Managed PKI and High-Availability CA Services
New survey data from Fortinet
Products and Releases  |  4/20/2015  | 
Third-party Research Reveals Consumer Behavior May Present Greater Challenges for Enterprises that Do not have the Right Security Protections in Place
Passages Helps Businesses Prevent Targeted Attacks, Defend the Network
Products and Releases  |  4/20/2015  | 
Company to demo new safe browsing solution at RSA Conference and present session ³Website Counterintelligence²
Raytheon Announces $1.57 Billion Acquisition of Websense
Products and Releases  |  4/20/2015  | 
Raytheon and Vista Equity Partners enter agreement to form new cybersecurity company
Study: 82% of Organizations Expect a Cyberattack, Yet 35% Are Unable to Fill Open Security Jobs
Products and Releases  |  4/16/2015  | 
Global Talent Pool Reflects Urgent Skills Shortage and Hiring Delays
Former CISO of eBay Dave Cullinane Launches TruSTAR, First Global Anonymous Cyber Incident Sharing Platform for Enterprises
Products and Releases  |  4/16/2015  | 
Platform Addresses Urgent Need for Instantaneous Cyber Intelligence Sharing to Level the Playing Field for CISOs
Attivo Networks closes $8M Series A
Products and Releases  |  4/16/2015  | 
Led by Bain Capital Ventures Bain Capital Venture’s Managing Director, Enrique Salem, Joins the Attivo Networks Board
NCR Signals Massive Makeover to Banking with Highly Secure Cloud-Based ATM Software Platform
Products and Releases  |  4/15/2015  | 
NCR’s Kalpana™ software transforms the ATM channel, introducing ground-breaking security designed to eliminate malware and reduce total cost of ownership by up to 40%
OpenSAMM Consortium Launches Industry’s First Public Benchmarking Data for Improving Software Security
Products and Releases  |  4/15/2015  | 
Pragmatic, Open Assessment Process Improves Usability by Enabling Organizations to Parse Data by Industry and Company Size
PCI COUNCIL PUBLISHES REVISION TO PCI DATA SECURITY STANDARD
Products and Releases  |  4/15/2015  | 
PCI DSS 3.1 and supporting guidance helps organizations address vulnerabilities within SSL protocol that put payment data at risk; PA-DSS revision to follow
FS-ISAC EXPANDS GLOBAL OPERATIONS: APPOINTS KRIS HERRIN SVP, GLOBAL BUSINESS SERVICES
Products and Releases  |  4/15/2015  | 
Also Launches New European-based Security Operations Center for Follow-The-Sun Threat Intelligence Sharing and Invests in New Regional Initiatives
Onapsis Awarded Key Patent for Automated Cyber-Security Assessment of SAP Systems and Business-Critical Applications
Products and Releases  |  4/15/2015  | 
Enterprises gain assurance of rigorous methods to protect business-critical applications, processes and data from cyber-attacks
One Tap On Your Phone Logs You In, With SecureEnvoy OneSwipe
Products and Releases  |  4/15/2015  | 
Leading Security Innovator Debuts its OneSwipe Prototype at the RSA Conference in San Francisco April 20-24 Demonstrating its Windows 10 NFC
Invincea Integrates Cloud Analysis and Enterprise Response Capabilities at the Endpoint
Products and Releases  |  4/15/2015  | 
Delivers Comprehensive Ability to Contain, Identify and Respond to Targeted Attacks
EdgeWave Unveils Military-Grade Breach Identification Service
Products and Releases  |  4/15/2015  | 
EdgeWave EPIC Security Assurance Service Enables Organizations to Identify and Immediately Respond to Cyber Attacks
Top 5 US Banks Collaborate on Security
Products and Releases  |  4/15/2015  | 
Behavioral analytics and threat detection come together with financial industry data sharing consortium
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.