Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content posted in June 2006
Page 1 / 4   >   >>
Our Data Isn't Secure, So What Are We Going To Do About It?
Commentary  |  6/30/2006  | 
One of the great things about my job is that there's never a shortage of things to do. This is especially the case when it comes to covering data security. Before the ink is dry on one story about a stolen laptop or breached database, I find another one to cover. But this troubling trend isn't just a case of "good-for-me-bad-for-you." I, too, have been ensnared in the web of identity theft and data breaches. Where is all this going, and what have we learned?
7 Lessons From IT Security Trial
Commentary  |  6/30/2006  | 
Over the last several weeks, InformationWeek has been covering the trial of a former UBS PaineWebber systems administrator, Roger Duronio, who's accused of writing and setting off a highly destructive logic bomb at his former employer as revenge for not receiving the maximum yearly bonus. The government prosecution contends that Duronio was not only looking to wreak havoc, but also to profit by purchasing securities whose valu
Dark Vacation
News  |  6/30/2006  | 
Dark Reading takes off July 3-4, and you should too
Saying 'No' to WiFi
News  |  6/30/2006  | 
Right next door to a Starbucks, Blue Cross of Idaho looks to Network Chemistry for an 802.11 lockdown
Enterprises Getting Soft on Security
News  |  6/30/2006  | 
Security losses are down, and so's IT security spending. Are enterprises setting themselves up for a nasty fall?
Did EMC Overpay?
News  |  6/30/2006  | 
The $2.1 billion for RSA shows EMC is serious about security but raises questions about price, integration challenges
Users Welcome Super-Deal
News  |  6/30/2006  | 
EMC's RSA acquisition appears to resonate well with IT pros
Windows Flaw, Word Trojan Found
News  |  6/30/2006  | 
Microsoft is looking into another possible Windows hole, and a new Trojan rides in on Word docs
EMC Secures RSA for $2.1B
News  |  6/29/2006  | 
EMC and RSA enter marriage of storage and security UPDATED 5:55 PM
Group to Research ID Theft
News  |  6/29/2006  | 
Universities, law enforcement agencies, and vendors team to study fraud and identity theft
Foundry Intros SecureIron
News  |  6/29/2006  | 
Foundry Networks announced the new SecureIron Perimeter Traffic Manager devices to augment perimeter security
SafeNet Adds to ranks
News  |  6/29/2006  | 
SafeNet announced the appointment of J. Carter Beese Jr. to its Board of Directors and John W. Frederick as Vice President
RSA Acknowledges Secret Suitor
News  |  6/29/2006  | 
The two vendors are rumored to be talking a marriage of storage and security
Cisco Issues WCS Warning
News  |  6/29/2006  | 
WiFi management platform turns up with a handful of vulnerabilities
Sentillion Offers Secure Virtualization
News  |  6/29/2006  | 
Sentillion, the leading provider of identity and access management solutions for the healthcare industry, today unveiled vThere
Hifn Cuts 22%
News  |  6/28/2006  | 
Hifn announced a series of actions today that are intended to accelerate Hifn's return to profitability
Cisco Seeks to Fill Security Gaps
News  |  6/28/2006  | 
Gaps between security products, and between IT and business groups, cause enterprise headaches, says Cisco's security CTO
BEW Offers Solutions
News  |  6/28/2006  | 
BEW Global implemented solutions to address HIPAA compliance concerns within The Portland Clinic and Longmont United Hospital
Lifespan Taps Vericept
News  |  6/28/2006  | 
Lifespan has selected The Vericept 360 degrees Risk Management Platform to protect sensitive patient health information and organization data
Warning Users of Dangerous Clicks
News  |  6/28/2006  | 
MarkMonitor's buyout of Collective Trust could allow ISPs to warn users about dangerous clicks ahead
Fearsome Decade
News  |  6/28/2006  | 
Escalation in sophistication and type of attacks means it's only a matter of time before you're a target
MarkMonitor Gets Collective Trust
News  |  6/28/2006  | 
MarkMonitor acquired CollectiveTrust to add their Zero-Hour fraud protection technology to MarkMonitor's anti-fraud solutions
Fortress, Nortel Team
News  |  6/28/2006  | 
Fortress and Nortel have formed a strategic relationship to provide government agencies worldwide with a joint solution
Upping The Ante On Data Collection
Commentary  |  6/27/2006  | 
So much about the overall issue and recent incidents of data loss are astounding, it's hard to know where to start. One good place is the Privacy Rights Clearinghouse, which offers up some sobering statistics on stolen data: Since Feb. 15, 2005 there has been over 200 data breaches (with some companies starring as repeat offenders) affecting the data of 88,399,953 individuals. At least - that's what's been report
Demons Lurk in Management Software
News  |  6/27/2006  | 
Systems management software may be the weakest link in the enterprise, according to researchers from Matasano Security
Mu Security Lands $10M
News  |  6/27/2006  | 
Mu Security has raised an additional $10 million in a Series B funding round
AppSec Rolls Out Tool
News  |  6/27/2006  | 
Application Security announced immediate availability of a new PCI-DSS Toolkit
Startup Locks Down Apps
News  |  6/27/2006  | 
Firewall pioneer Pensak is behind another venture intent on hardening applications where they live
SafeNet Updates
News  |  6/27/2006  | 
SafeNet announced a major upgrade of the industry-leading QuickSec IPSec VPN product line
Broadcom Debuts RFID
News  |  6/27/2006  | 
Broadcom Corporation introduced the world's first secure processor with integrated radio frequency identification (RFID) technology
Oversight Releases Survey
News  |  6/27/2006  | 
Companies are embracing the concept of enterprise risk management but continue to struggle with implementation
Mu Security Lands $10M
News  |  6/27/2006  | 
Mu Security announced the company has raised an additional $10 million in a Series B funding round
Symantec Bundles Security Services
News  |  6/26/2006  | 
Threat and Vulnerability Management Program blends security alerts with consulting
Fraud Monitoring Appliance on Tap
News  |  6/26/2006  | 
Cydelity appliance gives banks a detailed look at suspicious account activity
Symantec Streamlines Security Biz
News  |  6/26/2006  | 
Cuts investment in its hardware business amid plans for next-gen security software
GraniteEdge Updates ESP
News  |  6/26/2006  | 
GraniteEdge announced its latest release of GraniteEdge ESP - the only solution that automatically visualizes network behavior
MessageLabs Unveils Services
News  |  6/26/2006  | 
MessageLabs announced the launch of version 2.0 of its Web Security Services
Lockdown Joins Microsoft Program
News  |  6/26/2006  | 
Lockdown announced the launch of its open iNAC architecture
Iron Mountain Adds Protection
News  |  6/26/2006  | 
Iron Mountain introduced the PC Data Protection Suite
Datamonitor Lauds Crypto
News  |  6/26/2006  | 
A new technology report titled has acknowledged Cryptomathic as 'a leading supplier of strong security solutions'
Sensory, Vendors Partner
News  |  6/26/2006  | 
Sensory unveiled the industry's largest ecosystem of applications designed to run on Sensory's NodalCore acceleration platform
CSI/FBI: Small Firms Pay Big For Security
News  |  6/23/2006  | 
The per-user cost of security is much higher in small enterprises than in large ones, according to the forthcoming annual survey from the Computer Security Institute and the FBI
Phish Bait
News  |  6/23/2006  | 
A security company is testing the effects of a phishing exploit that comes from inside the corporate network
Blue Coat Grabs NetApp's NetCache
News  |  6/23/2006  | 
Proxy vendor Blue Coat eliminates a prime competitor by gaining funding and buying the NetCache Web content and security appliance line from Network Appliance for $23 million
Data Loss Epidemic
News  |  6/23/2006  | 
Data losses at major corporations and government agencies are being reported almost every day now
Data Losses Hit Four More
News  |  6/22/2006  | 
The list of big-name organizations reporting security breaches just keeps growing
Bit9 Recants Flaw
News  |  6/22/2006  | 
Bit9 issued a report announcing what it found to be the top 15 applications with known vulnerabilities
Vericept Upgrades Platform
News  |  6/22/2006  | 
Vericept announced version 8.0 of the Vericept 360 Risk Management Platform
No Easy Fix for Branch Office Blues
News  |  6/22/2006  | 
Branch offices spell IT trouble, says Arun Taneja, and need an 'arsenal' to fix things
Enterprise FMC's a Win-Win
News  |  6/22/2006  | 
Enterprise-focused FMC initiatives could have a major positive impact on wireless carriers finds the latest report Unstrung Insider
Page 1 / 4   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Data Breaches Affect the Enterprise
Data breaches continue to cause negative outcomes for companies worldwide. However, many organizations report that major impacts have declined significantly compared with a year ago, suggesting that many have gotten better at containing breach fallout. Download Dark Reading's Report "How Data Breaches Affect the Enterprise" to delve more into this timely topic.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-11-28
A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
PUBLISHED: 2021-11-28
ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function, it could execute any JAR file
PUBLISHED: 2021-11-27
janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
PUBLISHED: 2021-11-26
This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via C...
PUBLISHED: 2021-11-26
@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious...