Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in November 2007
<<   <   Page 4 / 4
DuPont Data Thief Sentenced to 18 Months
News  |  11/7/2007  | 
Gary Min must also pay fine, restitution after stealing $400M in trade secrets from chemical giant
V.i. Labs Gets $8M, Adds Board Members
News  |  11/7/2007  | 
V.i. Labs secures $8M in Round B, which was led by Ascent Venture Partners and Core Capital Partners; company also adds two to board
PCI Council Strengthens Data Security
News  |  11/7/2007  | 
Visa's Payment Application Best Practices program migrates to Council
Phoenix Launches Secure Hypervisor Platform
News  |  11/7/2007  | 
New platform from Phoenix will transform the user experience with new levels of security, reliability, ease of use, and low power consumption
Security Training: Take This Job And Secure It!
Commentary  |  11/6/2007  | 
Did you hear the one about the technology that was changing the way people do business? The one everybody wanted but nobody wanted to learn how to use safely?
F5 Intros App Security Manager, Joins PCI Council
News  |  11/6/2007  | 
F5 Networks delivers comprehensive application security solution with new BIG-IP Application Security ManagerT
Asierus Adds Fortinet for Virtualized Managed Security
News  |  11/6/2007  | 
Leading MSSP and its customers benefit from unified threat management protection in a virtualized model
Symantec Seals $350M Acquisition of Vontu
News  |  11/6/2007  | 
Mega-buyout is part of vendor's roadmap toward 'information-centric' security strategy, execs say
The Top 10 Most Evil Computers
Quick Hits  |  11/6/2007  | 
You think hackers are tough? Try having one of these babies mad at you
Maverick Reports Threat to US Power Grid
News  |  11/6/2007  | 
Simulated cyberattack shows hackers blasting away at the US power grid
Tizor, Vericept, Protegrity, Protiviti Host Webinar
News  |  11/5/2007  | 
Vericept, Protegrity, and Protiviti join Tizor for Webinar on developing the right data security strategy to address both risk and regulations
Mu Security Upgrades Analyzer Appliance
News  |  11/5/2007  | 
Cox Communications adds use cases
Layer 7, Software AG Partner
News  |  11/5/2007  | 
Expanded relationship addresses operational security and policy control for production SOA
Big Blue Security Lessons For Small And Midsized Businesses?
Commentary  |  11/5/2007  | 
IBM's planning on pumping a whopping (even for IBM) $1.5 billion into security research next year. Their target? You, me, our colleagues and employees.
F-Secure Supplies GM Dealer Equipment
News  |  11/5/2007  | 
General Motors Dealer Equipment protects US dealerships with F-Secure
The Devils in the Design
News  |  11/5/2007  | 
Are your software developers sabotaging your company's application code? How do you know?
Making Security Data 'Visual'
News  |  11/5/2007  | 
Free visualization tools can spice up the presentation of your security data
Startup Takes Aim at Man-in-the-Middle
News  |  11/5/2007  | 
KeyID is about to run pilot tests of its new browser plug-in that secures the authentication process
Learning From Tylenol
News  |  11/5/2007  | 
Are you prepared for your next security crisis? Learn these lessons before you hit the panic button
Trend Micro Rolls Out Mobile Security
News  |  11/5/2007  | 
Trend Micro announces all-in-one enterprise security for mobile devices
BMC Selects Klocwork
News  |  11/5/2007  | 
Klocwork integration with Microsoft Visual Studio enables BMC developers to analyze source code at the desktop
Crypthomathic Adds Key Management System
News  |  11/5/2007  | 
Company becomes first security vendor to announce the development of a GlobalPlatform compliant key management system for the financial sector
Utimaco, Safend Partner
News  |  11/5/2007  | 
Utimaco adds data leakage protection to its portfolio
Alert Logic Rolls Out SaaS Log Mgt
News  |  11/5/2007  | 
New Alert Logic log manager offers mid-sized organizations easiest way to collect, review, and archive Logs
ArcSight, ComGuard Partner in Middle East, N. Africa
News  |  11/5/2007  | 
ComGuard to distribute key ArcSight Enterprise Security and Compliance Management Solutions as vendor expands into new region
Why Cops Can't Catch Cybercriminals
Quick Hits  |  11/5/2007  | 
Hurdles in digital forensics systems create obstacle for law enforcement, says top fed
The Hartford Loses Tapes With Data on 237,000 People
News  |  11/2/2007  | 
Backup tapes have been missing since September 27 and include data from customers, employees, and others
Bots, Bots Everywhere
News  |  11/2/2007  | 
Implementing firewall rules at both the host and the perimeter could stop a lot of bot infections
Threats That Go 'Hack' in the Night
News  |  11/2/2007  | 
Some of these exploits are pretty scary in the daytime too
Healthcare Provider Adopts Next-Gen Firewall
News  |  11/2/2007  | 
Mercy Medical Center tightens up user access with Palo Alto Networks's PA-4000
NAC's Painful Realities
Quick Hits  |  11/2/2007  | 
Solving the endpoint security problem means cutting through the NAC hype, expert says
New Key Management Technology Could Improve RFID Security
News  |  11/1/2007  | 
Tutarus, SecureRF encrypt RFID data on the chip
Cisco Swallows Securent for $100M
News  |  11/1/2007  | 
Reveals plans to tie storage, network, and SAAS security together
Spoofed Prez Candidate Sites Have Malware
News  |  11/1/2007  | 
Internet users fooled into downloading malware from spoofed presidential candidate Websites
BT Adds Secure Messaging Services
News  |  11/1/2007  | 
BT launched two new encryption solutions that guarantee privacy to the strictest regulatory standards
PineApp Unveils Porn Filter
News  |  11/1/2007  | 
PineApp unveils powerful anti-pornography MegaFilter for Mail-SeCure appliances
Have You Got the Winning Bug?
Quick Hits  |  11/1/2007  | 
iDefense contest offers up to $12,000 for security bug plus exploit code
Securent Unveils Guidelines
News  |  11/1/2007  | 
Securent unveils guidelines for centralizing control and visibility of entitlement management across enterprise and remote office applications
Archer Updates Risk Management Dashboard
News  |  11/1/2007  | 
Archer Technologies releases version 4.0 of the award-winning Archer SmartSuite framework
AppGate Adds Secure USB Client to VPN
News  |  11/1/2007  | 
AppGate introduces the secure USB end-point client to its VPN system
PDFs Led Malware Threats in Oct.
News  |  11/1/2007  | 
Malicious PDF files accounted for up to two thirds of infected email in three-day spam campaign
IBM Focuses on Risk Management
News  |  11/1/2007  | 
New services, products and research aim to manage business risk from the enterprise to the edge
IBM Announces End-to-End PCI Solution
News  |  11/1/2007  | 
New five-phase program designed to help customers meet all 12 PCI requirements
<<   <   Page 4 / 4


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-33035
PUBLISHED: 2021-09-23
Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the all...
CVE-2021-34767
PUBLISHED: 2021-09-23
A vulnerability in IPv6 traffic processing of Cisco IOS XE Wireless Controller Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a Layer 2 (L2) loop in a configured VLAN, resulting in a denial of service (DoS) condition for that V...
CVE-2021-34768
PUBLISHED: 2021-09-23
Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected dev...
CVE-2021-34769
PUBLISHED: 2021-09-23
Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected dev...
CVE-2021-34770
PUBLISHED: 2021-09-23
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to execute arbitrary code with administrative privileges or cause a deni...