Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in April 2006
Identity Engines Has NAC Solution
News  |  4/30/2006  | 
Ignition v3.0 includes dynamic network session provisioning and integrated guest access management
10 Security Vendors You've Never Heard Of
News  |  4/30/2006  | 
Intriguing startups - mostly - that deserve a closer look for fulfilling a broad range of enterprise requirements
Security Bugs Undercut Mozilla
News  |  4/30/2006  | 
New flaws leave experts wondering if Mozilla's such a great alternative to Microsoft Internet Explorer and Exchange
DR Q&A: Nortel's Ravi Kumar
News  |  4/30/2006  | 
From NAC to Trusted Computing Group and the Enterprise Policy Manager, Kumar lays out Nortel's security strategy
Interop Brings Big NAC Attack
News  |  4/30/2006  | 
Network access control is on a roll. Here's a quick market overview and a roundup of newly-announced products
Aventail Sets Sights on Mobile Security
News  |  4/30/2006  | 
Startup looks to break away from the SSL VPN pack by locking down mobile devices
Virtual Machines Get the NAC
News  |  4/30/2006  | 
Startup FireEye has melded VMs with network access control for greater simplicity
NeoAccel Lands $4M
News  |  4/28/2006  | 
NeoAccel announced its Series A3 funding round of approximately $4 million led by Baring Private Equity Partners' India Fund
The Doors to Join Pearl Jam in Online Content Delivery
News  |  4/28/2006  | 
Rock groups use Savvis and Basecamp Productions to securely deliver new material online
ConSentry Secures LANs
News  |  4/27/2006  | 
ConSentry announced the LANShield Switch, an enterprise-class switch
Harris Gets Crypto Contract
News  |  4/26/2006  | 
Harris has been awarded a $4.3 million contract by Rockwell Collins to provide the Harris four-channel Sierra II encryption module
Med Data Providers in Pact
News  |  4/26/2006  | 
MedicAlert will make MyMedicalRecords.com's advanced digitized record keeping services available to its millions of members
Do Your Passwords Pass Microsoft's Test?
Commentary  |  4/25/2006  | 
There's a scene in the movie Spaceballs when King Roland, having given in to Dark Helmet's threats, tells him that the combination to his planet's "air shield" is 1, 2, 3, 4, 5. Exasperated, Dark Helmet responds, "That's the stupidest combination I've ever heard in my life! The kind of thing an idiot would have on his luggage!" Moments later, we learn that this is indeed the combination to the evil President Skroob's luggage. At this point, we're pretty sure that Lone Starr and the rest o
NeoScale Manages Security
News  |  4/25/2006  | 
NeoScale will present CryptoStor KeyVault to attendees at EMC World 2006
AppSecInc Secures $10M
News  |  4/25/2006  | 
Application Security announced a strategic funding round led by Paladin Capital Group
Sony Taps PGP Encryption
News  |  4/25/2006  | 
Sony Computer Entertainment Europe has selected PGP Whole Disk Encryption for Enterprises
Bay Micro Growing Fast
News  |  4/25/2006  | 
Bay Microsystems is the fastest growing network processor company in the industry, based on the Networking Silicon Market Share Report
HISS Tests GSM Tracker
News  |  4/24/2006  | 
Homeland Integrated Security Systems (HISC) has successfully conducted the first GSM testing of its revolutionary Cyber Tracker
Security Research Isn't Pretty, But It's Necessary
Commentary  |  4/17/2006  | 
Security research is a dirty job, but somebody has to do it. Security researchers run an assembly line of self-aggrandizing publicity, churning out press releases and announcements patting themselves on the back for discovering security vulnerabilities in software by Microsoft, Oracle, and other major vendors. The researchers operate under a constant cloud of suspicion: Are they simply creating a climate of useless fear, stifling innovation, E-commerce, and technology implementation? Are they
Software Security Groupies Kiss And Tell
Commentary  |  4/13/2006  | 
Bet you didn't know that software companies, like rock stars, have groupies. Rock star groupies know every word to every one of their favorite band's songs, and they know how to wrangle backstage passes that make them privy to the band's inner workings. In my April 17 article on software companies and the security researcher groupies who love them, I spin a yarn about several instances where researchers found their way onto the proverbial tour bus. Do the people in charge of IT security really w
IT Security: Playing To Win
Commentary  |  4/11/2006  | 
Security company Fortify Software today released a Flash-based game called IT Defender that attempts to educate players about workplace security risks while they risk their jobs by playing a game at work. Sure, it's a PR ploy. But it's a good one. (Really, anything is better than another press release.) As a game, it's nothing groundbreaking, but it's nicely done for what it is.


I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13157
PUBLISHED: 2019-11-22
nsGreen.dll in Naver Vaccine 2.1.4 allows remote attackers to overwrite arbitary files via directory traversal sequences in a filename within nsz archive.
CVE-2012-2079
PUBLISHED: 2019-11-22
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
CVE-2019-11325
PUBLISHED: 2019-11-21
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
CVE-2019-18887
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
CVE-2019-18888
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. T...