Content tagged with Compliance
Latest
Page 1 / 2   >   >>
Cartoon: E2c$y5tion
Cartoon Contest  |  4/18/2014  | 
New Osterman Research Report: Only 13% Happy With Compliance Methods
Products and Releases  |  4/16/2014  | 
Burdensome Compliance Management Processes are Eating Into IT Budget
White House Details Zero-Day Bug Policy
News  |  4/15/2014  | 
NSA denies prior knowledge of the Heartbleed vulnerability, but the White House reserves the right to withhold zero-day exploit information in some cases involving security or law enforcement.
BlackBerry Advances Security of its Multi-Platform Mobility Portfolio with New Cryptography Certification
Products and Releases  |  3/26/2014  | 
FIPS 140-2 validation granted for Secure Work Space for iOS and Android
March Madness: Online Privacy Edition
Commentary  |  3/26/2014  | 
Say hello to the privacy revolution where an emerging backlash is being spurred by NSA spying, mass data collection and plain old common sense.
Target, PCI Auditor Trustwave Sued By Banks
News  |  3/26/2014  | 
Trustwave apparently certified the retailer as PCI compliant -- but can PCI assessors be held liable for data breaches?
Liberty International Underwriters to Provide Network Activity Monitoring through BitSight Technologies for LIU Data Insure Policyholders
Products and Releases  |  3/26/2014  | 
Insurer partners with BitSight Technologies to deliver big data analysis capabilities to policyholders
IT Security Pros Abandoning Traditional Security Measures In Favor Of SMS-Based Two-Factor Authentication
Products and Releases  |  3/12/2014  | 
Ponemon and Tyntec survey finds 68% believe username/passwords not enough
Windows XP Security Issues: Fact Vs. Fiction
News  |  3/12/2014  | 
Are you prepared for the end of Microsoft support for Windows XP next month?
Security Services Cater To SMBs
News  |  3/11/2014  | 
Cloud and managed security services are headed down market with simpler interfaces masking their enterprise heritage
Compliance Is Not Hard
Commentary  |  2/26/2014  | 
Compliance requires a new set of healthy habits and the self-discipline to make those habits stick
Microsoft Beefs Up EMET
Quick Hits  |  2/25/2014  | 
Early release of anti-exploit tool shuts down bypass methods created by Bromium Labs
Cylance Announces $20 Million in Series B Funding
Products and Releases  |  2/21/2014  | 
Blackstone, Khosla Ventures, Fairhaven Capital and Private Investors Accelerate Cylance's Growth and Advanced Mathematics Platform
Okta Delivers New Identity Offerings to Power Cloud-Based Services
Products and Releases  |  2/20/2014  | 
Jive Software and Advent Software Among Cloud Service Providers Using Okta to Address Range of Identity-Related Needs for Innovative Cloud Offerings
Cylance Unveils CylancePROTECT, Applying Math to Prevent Advanced Cyber Threats on Company Endpoints
Products and Releases  |  2/18/2014  | 
New Endpoint Security Software Instantly and Mathematically Determines What is Safe and What is a Threat Without the Use of Signatures, Heuristics, Behavioral Analysis, Sandboxing Detonation or Micro-virtualization
FIDO Alliance Publishes Authentication Standards; First Products Unveiled
Quick Hits  |  2/17/2014  | 
FIDO Alliance issues specs for "authentication plumbing;" Nok Nok ships first implementation
The Mysterious Appearance Of An Anti-Theft Application
Quick Hits  |  2/13/2014  | 
Kaspersky Lab researchers discover on their machines Absolute Software Computrace anti-theft application -- but they had not installed it
Microsoft Enters Into New Global Partnerships In Fight Against Cybercrime
Products and Releases  |  2/12/2014  | 
Company joins forces with Organization of American States, Europol, and FIS to expand efforts to make Internet safer for consumers worldwide
Locking Down E-Mail With Security Services
News  |  2/12/2014  | 
Companies are increasingly looking to the cloud for services to encrypt, back up, and archive their e-mail to protect from accidental leakage and intentional disruption
A Quarter Of Parents Fear Their Children Have Been Exposed To Cyberthreats In Past Year
Products and Releases  |  2/11/2014  | 
One in five parents fail to monitor their child's online activity, according to Kaspersky Lab
Security Innovation Applauds U.S. DOT Decision To Move Forward With 'Talking Cars' Program
Products and Releases  |  2/6/2014  | 
US DOT research indicates that safety applications using V2V technology can reduce the majority of crashes
Javelin Study: A New Identity Fraud Victim Every Two Seconds
Quick Hits  |  2/6/2014  | 
Javelin report says identity fraud increased to 13.1 million victims in 2013
NAC Comes Back
News  |  2/5/2014  | 
BYOD and advanced malware help resuscitate network access control
Facebook 10th Anniversary: Social Media Security Infographic
Products and Releases  |  2/5/2014  | 
The explosion of Facebook and other social networking sites has created a new set of online security problems, according to SecurityCoverage
Ahead Of Senate Judiciary Committee Hearing On Data Breaches, Blumenthal, Markey Introduce Bill To Protect Consumer Information From Hackers
Products and Releases  |  2/4/2014  | 
Personal Data Protection and Breach Accountability Act aims to reduce likelihood that hackers can steal consumers' personal and financial information
Chip-and-PIN Security Push To Pit Retailers Against Banks
News  |  1/30/2014  | 
While the cost of breaches typically falls on the merchants, card issuers and banks would foot much of the bill for improving the security of the payment-card system
HALOCK Investigation Finds That Over 70% Of Mortgage Lenders May Be Putting Sensitive Financial Data At Risk
Products and Releases  |  1/30/2014  | 
Lenders permitted applicants to send personal and financial information over unencrypted email as email attachments
Verizon Collaborating With PRIVO To Protect Children's Online Activities And Information
Products and Releases  |  1/29/2014  | 
Under pilot program, PRIVO will establish the Minors Trust Framework to provide parents more control and help businesses address COPPA requirements
Securing The Distributed Network Perimeter
News  |  1/28/2014  | 
A variety of cloud and managed services can be used to lock down the rapidly expanding corporate network perimeter
Secret Service Investigating Breach At Michael's Retail Chain
Quick Hits  |  1/28/2014  | 
Retail giant Michael's still has not disclosed source or scope of breach; Secret Service called in
Electronic Transactions Association (ETA) Updates Congress On Payments Industry Security
Products and Releases  |  1/27/2014  | 
Letter reiterated the payments industry's support for a uniform, national standard for data breach notification
Startup Tackles Security Through Microsoft Active Directory
Quick Hits  |  1/23/2014  | 
New company Aorato identifies potential threats by monitoring traffic from ubiquitous Active Directory
ThreatMetrix Shares Strategies For Implementing Effective Security Measures Without Disrupting Authentic Users And Compromising Privacy
Products and Releases  |  1/22/2014  | 
Company suggests using behavior-based identity proofing
National Retail Foundation Urges Transition To More Secure And Advanced Credit And Debit Cards
Products and Releases  |  1/22/2014  | 
Expresses support for immediate transition from magnetic-stripe cards to more secure and advanced PIN and chip cards
'Password' Unseated By '123456' On Splashdata's Annual 'Worst Passwords' List
Products and Releases  |  1/21/2014  | 
List shows that many people continue to put themselves at risk by using weak, easily guessable passwords
Wickr Announces Bug Bounty Program--100 Million Messages Sent
Products and Releases  |  1/15/2014  | 
Will pay hackers up to $100,000 to uncover any vulnerabilities that substantially affect the confidentiality or integrity of its users' data
Black Lotus Delivers DDoS Protection For Data Centers And Service Providers
Products and Releases  |  1/14/2014  | 
Protection for Networks solution is providing data center companies and service providers worldwide with around-the-clock availability
FTC Warns Users Of New Twist On Tech Support Scam
Quick Hits  |  1/14/2014  | 
Scammers now offering "refunds" on bogus tech support services, stealing customer data, FTC says
Feds Failing To Secure Their Mobile Devices
Quick Hits  |  1/13/2014  | 
New study finds one-third of government workers use public WiFi and one-fourth don't password-protect the devices
Survey: U.S. Citizens More Worried About ID Theft Than Privacy
Quick Hits  |  12/27/2013  | 
Despite NSA scare, U.S. voters are five times more concerned about hacking than tracking, CCIA study says
Nominum Launches Tool To Minimize Effect Of DNS-Based DDoS Attacks
Products and Releases  |  12/18/2013  | 
Vantio CacheServe 5.4 introduces precision policies to rate limit DNS traffic based on specific criteria
How To Safely Retire Mobile Devices
News  |  12/16/2013  | 
Once employees bring their new iPads, Androids, to work after Christmas, their older mobile devices must be decommissioned to protect company data
Christmas Warning: Kaspersky Lab Finds Gamers Attacked 11.7 Million Times In 2013
Products and Releases  |  12/13/2013  | 
On average, users in Europe were hit by 34,000 attacks related to gaming malware daily
One In Four U.K. Consumers Have Had Online Accounts Hacked
Products and Releases  |  12/11/2013  | 
Hotmail, Facebook, Yahoo, and PayPal accounts identified as breached most often
Google Reports Unauthorized Digital Certificates
Quick Hits  |  12/10/2013  | 
Google tracks down unauthorized digital certificate, blocks intermediate certificate authority
Best Practices For Reducing Traffic Fraud Risk Unveiled By IAB
Products and Releases  |  12/9/2013  | 
IAB is also publishing “Digital Simplified: Understanding Traffic Fraud,” an educational backgrounder on how digital advertising fraud takes place
Microsoft Teams With Law Enforcement, Disrupts ZeroAccess Botnet
Quick Hits  |  12/9/2013  | 
Microsoft, FBI, and Europol say they have disrupted ZeroAccess, a botnet that infected more than 2 million machines
Microsoft, The FBI, Europol And Industry Partners Disrupt The Notorious ZeroAccess Botnet
Products and Releases  |  12/5/2013  | 
Global action aims to protect millions of computers infected with malware that is responsible for hijacked search results and click fraud
As Holiday Shopping Rises, So Does Threat Of Identity Theft
Products and Releases  |  11/26/2013  | 
The Hanover Insurance Group offers tips to help shoppers keep their identities and wallets safe this holiday shopping season, both at the mall and online
Preventing Security Breaches Caused By Audio Devices
Products and Releases  |  11/26/2013  | 
Belkin Secure Headset Adapter designed to securely connect analog audio devices to computers
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If you’re still focused on securing endpoints, you’ve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web