Products and Releases

Content posted in October 2011
Page 1 / 2   >   >>
Internal Fraud On The Rise, Kroll's Annual Global Fraud Report Reveals
Products and Releases  |  10/31/2011  | 
Study shows that 60 percent of frauds are committed by insiders, up from 55 percent last year
Prolexic Predicts Increasing DDoS Attack Durations Against Companies During Holiday Season
Products and Releases  |  10/31/2011  | 
Company launches marketing campaign to help e-commerce companies prepare
CloudPassage Launches Halo GhostPorts Features
Products and Releases  |  10/31/2011  | 
Remote administrative access to cloud servers protected with real-time multifactor authentication and dynamic firewall rules
Veracode: Top 5 Most Exploited App Security Flaws
Products and Releases  |  10/28/2011  | 
Flaws that could be lurking in your organization's software portfolio
Yubico Provides A Radically New Approach To Secure Remote Access
Products and Releases  |  10/28/2011  | 
YubiRADIUS free, virtual appliance server delivers secure remote access, SSL-VPN and VPN connectivity
Websense Reports Record Revenues
Products and Releases  |  10/27/2011  | 
Revenues up 9% year-over-year
Bradford Networks Launches New App That Enables Secure Network Access For iPads, iPhones
Products and Releases  |  10/27/2011  | 
App enables trusted Apple mobile devices to fully access corporate networks
BlueCava Closes $9.5M Round
Products and Releases  |  10/27/2011  | 
Venture capital firm S3 Ventures led the round
SonicWALL Extends Branch Office Protection With New Next-Generation Application-Aware Firewalls
Products and Releases  |  10/27/2011  | 
Unveils NSA 220 Series and NSA 250M Series
NortonLive Ultimate Help Desk Now Supports Macs
Products and Releases  |  10/27/2011  | 
NortonLive Ultimate Help Desk now supports Mac OS 10.5 and above
Fraudlogix Introduces Fraud Index
Products and Releases  |  10/27/2011  | 
Tool provides near real-time indicators of fraud across the affiliate marketing industry
Richard Clarke Calls Out China As Source Of Cyber Hacks
Products and Releases  |  10/27/2011  | 
Clarke outlines four main buckets of cyberattacks
Online Fraud Survey Results: 1/3 Of Consumers Don't Trust The Government
Products and Releases  |  10/26/2011  | 
Consumers trust federal government least, local and municipal government most
Symantec Reports Record Second Quarter Fiscal 2012 Results
Products and Releases  |  10/26/2011  | 
GAAP revenue of $1.681 billion, up 14%
CyberPatriot IV Begins Competition Season
Products and Releases  |  10/26/2011  | 
CyberPatriot is the nation's largest high school cybersecurity challenge
F5 Revenue Exceeds One Billion Q4 And Fiscal 2011 Earnings
Products and Releases  |  10/26/2011  | 
Fourth quarter revenue up 8 percent sequentially
IBM Closes on Acquisition Of Q1 Labs
Products and Releases  |  10/26/2011  | 
Q1 Labs will join the newly formed Security Systems division
Accellion Delivers Encrypted 'Container' For Mobile File-Sharing
Products and Releases  |  10/25/2011  | 
Accellion Mobile App offers encrypted, protected container for mobile file sharing
The Identity Theft Council Warns Of Increased Risk Of Identity Theft To Small Businesses
Products and Releases  |  10/25/2011  | 
National cybersecurity awareness month calls to small businesses to prevent, detect, and remedy identity theft threats
New Survey Finds Consumers Are Cautious About Being Online But Need More Vigilance When Protecting Privacy
Products and Releases  |  10/24/2011  | 
Anonymizer infographic illustrates dangers of online privacy breaches
Tufin Adds Change Management Capabilities To SecureTrack Firewall
Products and Releases  |  10/24/2011  | 
SecureChange manages the entire life cycle of a configuration change request
Smart Card Alliance Publishes White Paper on Commercial Identity Verification (CIV) Credentials For Enterprises
Products and Releases  |  10/24/2011  | 
White paper provides an overview of PIV, PIV-I and CIV Credentials
NetSuite and CA Technologies Partner In Cloud Security
Products and Releases  |  10/24/2011  | 
NetSuite and CA Arcot WebFort two-factor approach supports cryptographic tokens adhering to OATH standard
Cisco Enhances Unified Fabric
Products and Releases  |  10/24/2011  | 
Unveils second-generation capabilities for the Nexus 7000 family
Sourcefire To Extend Intrusion PreventionTo Red Hat Enterprise Virtualization Platform
Products and Releases  |  10/24/2011  | 
Also joins the Open Virtualization Alliance
eEye Releases the First and Only Free Vulnerability Management Solution, Retina CS Community
Products and Releases  |  10/21/2011  | 
Retina CS Community can identify and patch vulnerabilities in third-party applications
Cyber-Ark Provides Secure File Sharing For iPad And Other Mobile Devices
Products and Releases  |  10/21/2011  | 
New release improves data security for file transfers conducted via mobile devices
eEye Announces Industry’s First Vulnerability Management Solution For Virtualized Applications
Products and Releases  |  10/20/2011  | 
Solution is now available as part of eEye's Retina suite of products
Trend Micro Expands Mobile Protection For Android
Products and Releases  |  10/19/2011  | 
Collaborates with KDDI to deliver security service for customers using the Android platform
Zscaler ThreatLabZ Releases Free IPAbuseCheck
Products and Releases  |  10/19/2011  | 
IPAbuseCheck lets company query an IP address to see if it's intentionally or unintentionally being abusive
LANDesk Furthers Cloud Management Capabilities With Service Desk As A Service
Products and Releases  |  10/19/2011  | 
Enables IT administrators to design processes without having to write code
Lieberman Integrates Password Manager With McAfee ePolicy Orchestrator
Products and Releases  |  10/19/2011  | 
Enterprise Random Password Manager now automatically discovers and updates credentials used by McAfee ePO
Application Security Inc. Adds Adds 'Active Response' Feature Set
Products and Releases  |  10/18/2011  | 
DbProtect Active Response lets organizations define and map appropriate responses to specific activities and users
Fidelis Security Systems Releases New Insider Threat Intel
Products and Releases  |  10/18/2011  | 
Advisories range from SSL challenges to IPv6 issues
Georgia Tech: iPhones Can Turn Into spiPhones
Products and Releases  |  10/18/2011  | 
Smartphones’ accelerometer can track strokes on nearby keyboards
Aveksa Unveils Access Fulfillment Express
Products and Releases  |  10/18/2011  | 
AFX provides a new approach to access fulfillment
Lieberman Software: Password Misuse At Root Of Hacking
Products and Releases  |  10/18/2011  | 
Forty-eight percent of IT security professionals surveyed have worked in organizations that have been hacked
New Cloud Security And Compliance Solutions Added To The Akamai Intelligent Platform
Products and Releases  |  10/18/2011  | 
Akamai Intelligent Platform includes two new offerings
Lookout Mobile Security Rolls Out Free iPhone Security App
Products and Releases  |  10/18/2011  | 
Lookout for iPhone can help locate a lost or stolen phone on a map or sound a loud alarm to find it nearby
Panda Security Launches Latest Version Of Panda Cloud Partner Center
Products and Releases  |  10/17/2011  | 
Partners who sign up will receive five free licenses of Panda Cloud Office Protection for cloud-based endpoint security
Deloitte Survey: Inadequate Internal Awareness Toward Mobile Security
Products and Releases  |  10/14/2011  | 
Nearly 87 percent of respondents feel their company is at risk for a cyberattack originating from a mobile security lapse
General Dynamics Awarded Information Assurance And Cyber Security Contract By Defense Intelligence Agency
Products and Releases  |  10/14/2011  | 
General Dynamics will provide services to ensure security of DIA's information
StillSecure Launches New Cloud Security Monitoring Solution With SoftLayer
Products and Releases  |  10/13/2011  | 
Cloud SMS provides IaaS customers with a host-based firewall management solution
Malware Did Not Affect U.S. Air Force Remotely Piloted Aircraft Operations
Products and Releases  |  10/13/2011  | 
Malware in question is a credential stealer, not a keylogger
Qualys And Risk I/O Partner
Products and Releases  |  10/12/2011  | 
Companies will integrate Risk I/O with QualysGuard
Private Tunnel: Protect Yourself Against The BEAST
Products and Releases  |  10/12/2011  | 
Private Tunnel encrypts data traffic at network layer
Trend Micro Teams With HyTrust To Enable Cloud Security And Control
Products and Releases  |  10/12/2011  | 
Companies deliver new PCI DSS 2.0 compliance reporting tool for virtual machines and cloud infrastructures
New Diebold Innovation Helps Consumers Secure Their Bank Cards And Accounts
Products and Releases  |  10/12/2011  | 
MobiTransact Card Lock uses mobile channel as an out-of-band authentication tool for ATM and POS transactions
Georgia Tech Forecasts Cyber Threats For 2012
Products and Releases  |  10/12/2011  | 
Reveals new and increasingly sophisticated means to capture and exploit user data
New ESET Family Security Pack Provides Cross-Platform Protection For Multiple Devices
Products and Releases  |  10/12/2011  | 
Provides consumers with a single universal license to protect up to five computers across various operating systems
Page 1 / 2   >   >>

13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
From DevOps to DevSecOps: Structuring Communication for Better Security
Robert Hawk, Privacy & Security Lead at xMatters,  2/15/2018
3 Tips to Keep Cybersecurity Front & Center
Greg Kushto, Vice President of Sales Engineering at Force 3,  2/14/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.