Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in October 2013
Page 1 / 3   >   >>
PCI Security Standards Council's Validated Point-To-Point Encryption Available Now
Products and Releases  |  10/30/2013  | 
European Payment Services (EPS) is the first company to have a solution listed
McAfee And Office Depot Survey Reveals SMBs Have False Sense Of Security
Products and Releases  |  10/30/2013  | 
One of the biggest reveals from the survey was that 14 percent of SMBs haven’t implemented any security measures
New Online Security Course Available To Small Business Owners
Products and Releases  |  10/30/2013  | 
Provides overview on how to secure business information, identify security threats, and guard against cyberattacks
Lockheed Martin Cyber Solution Enables Secure Data Sharing Between Top Secret And Unclassified Security Domains
Products and Releases  |  10/30/2013  | 
Trusted Sentinel controls the release of information commensurate with the security level of the information being processed
Verint Acquires Voice Biometric Company Victrio
Products and Releases  |  10/30/2013  | 
Combined solution joins Victrio's voice biometrics and predictive analytics with Verint's customer-centric workforce optimization (WFO) solutions
New RSA Products and Services Boost Security Operations; Eliminate Security And Compliance Trade-Offs
Products and Releases  |  10/30/2013  | 
new products and services address traditional SIEM requirements as part of a advanced security strategy
Marble Adds Mobile App Management To Mobile Security Platform
Products and Releases  |  10/30/2013  | 
Enables companies to set up and manage an app store/catalog for employees and contractors
NQ Mobile Announces Formation Of Independent Special Committee
Products and Releases  |  10/30/2013  | 
Committee to conduct an independent review of the allegations raised in a report issued by Muddy Waters dated Oct. 24, 2013
Ryan & Maniskas, LLP Announces Investigation Of NQ Mobile Inc.
Products and Releases  |  10/30/2013  | 
Investigation related to allegations that NQ Mobile misrepresented efficacy of product platforms
ForeScout Teams With SAP To Secure BYOD And Complete Enterprise Mobility
Products and Releases  |  10/29/2013  | 
Announce interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms
New AlgoSec Study Uncovers Application Connectivity Management Challenges Are Impacting Security And Business Agility
Products and Releases  |  10/29/2013  | 
Survey findings indicate complexity of critical business application connectivity as well as data center and application cloud migrations
Waterfall Security Introduces FLIP And Modular Solutions, Expands Mission
Products and Releases  |  10/29/2013  | 
Solutions highlight ways that Unidirectional Security Gateway technology can meet the needs of control system admins
Surveillance Issues Overshadow Talks At End Of Internet Governance Forum 2013
Products and Releases  |  10/29/2013  | 
Future of Internet could be shaped by global reaction to surveillance, participants say
Sophos Announces Cloud Strategy And Endpoint Protection Solution
Products and Releases  |  10/29/2013  | 
Sophos Cloud provides endpoint protection
New RSA Security Brief Provides Road Map For Next Generation Security Operations
Products and Releases  |  10/29/2013  | 
Brief authors say most breaches today result from organizations stumbling on basic security practices
Tufin Survey Reveals End-To-End Orchestration Of Network Security Policy Is "Essential For Business Agility"
Products and Releases  |  10/29/2013  | 
Almost nine out of 10 IT and business decision-makers said coordination of security policy across the entire network is "essential"
Avira Revamps Free Mac Security For OS X Mavericks
Products and Releases  |  10/29/2013  | 
New version of Avira Free Mac Security can perform quick scan of vulnerable directories on the computer even as the security software is being installed
CylanceV Exposes Unknown Threats Lurking On Computers Worldwide
Products and Releases  |  10/29/2013  | 
CylanceV mathematically determines what is safe and what is a threat in the broadening spectrum of unknown data
Mobile Biometric Security Products And Services To Generate Over $8.3 Billion Revenue By 2018
Products and Releases  |  10/28/2013  | 
By 2018, 3.4 billion users will be using biometrics on their mobile devices, according to Goode Intelligence
Dell Rolls Out New Security Products
Products and Releases  |  10/28/2013  | 
New products aimed at providing seamless protection of data from the endpoint to the datacenter to the cloud
DB Networks Introduces Industry's Behavioral Analysis-Based Core IDS To Detect Advanced And Zero-Day SQL Injection Attacks
Products and Releases  |  10/28/2013  | 
IDS-6300 intelligent security appliance works passively in the core of the IT infrastructure and is operationally transparent
Symantec Reports Second Quarter Fiscal 2014 Results
Products and Releases  |  10/28/2013  | 
Revenue down 4 percent year-over-year
WhiteHat Security Launches New Customer Support Portal
Products and Releases  |  10/28/2013  | 
From the CSC, customers can log in and track all of their Sentinel support requests
CodeLathe Rolls Out FileCloud 4.0
Products and Releases  |  10/28/2013  | 
New version adds mobile device management capabilities
NetCitadel And Webroot Partner To Bring Security Intelligence To The Enterprise
Products and Releases  |  10/28/2013  | 
NetCitadel will embed Webroot IP Reputation Service into its Threat Management Platform
HID Global And Consortium Partners Receive U.S. Cyber Security Grant For Identity Protection Pilot
Products and Releases  |  10/28/2013  | 
Consortium will incorporate identity and attribute verification technology contained in variety of form factors
Integralis Completes Name Change To NTT Com Security
Products and Releases  |  10/28/2013  | 
Will continue promoting its portfolio of managed security, business infrastructure, consulting, and technology integration services
Alleged Hacker Indicted In New Jersey For Data Breach
Products and Releases  |  10/28/2013  | 
Investigation led by the U.S. Army Criminal Investigation Command-Computer Crime Investigative Unit and the FBI in Newark revealed that Lauri Love allegedly illegally infiltrated U.S. government computer systems
Baidu Antivirus Is First To Eliminate Malicious Virut Botnet
Products and Releases  |  10/25/2013  | 
Infected computers can become hosts for DDoS attacks, spam, fraud, data theft, and illicit pay-per-install activities
Net Orbit Exposes Slacker Employees On Company Networks
Products and Releases  |  10/25/2013  | 
Software allows managers to seamlessly monitor and control client workstations
IBM Labs Develops New Method For Securing Data Before It Goes To The Cloud
Products and Releases  |  10/25/2013  | 
Technique helps overcome security concerns by redacting, removing, or replacing sensitive data from records that are being sent to the cloud for processing
Not Your Father's IPS: SANS Releases Results On Its Network Security Survey
Products and Releases  |  10/25/2013  | 
Results indicate that respondents want and need more information than their traditional IPS will give
Nominum Launches Vantio ThreatAvert To Protect Fixed And Mobile Networks
Products and Releases  |  10/25/2013  | 
Prevents and neutralizes attacks on internal resources, such as routers, DNS servers, gateways, and EPC resources
Bitdefender Introduces Tech Assist
Products and Releases  |  10/25/2013  | 
Tech Assist provides direct problem-solving, 24 hours a day
WatchGuard Technologies Extends Email And Web Gateway Security Features
Products and Releases  |  10/24/2013  | 
WatchGuard XCS 10 adds Microsoft Hyper-V support, expands IPv6 capabilities, and enables custom policy enhancements
Santa Clara Ranks #1 In The U.S. For Online Fraud Origination
Products and Releases  |  10/24/2013  | 
ThreatMetrix reviewed activity from Q3 2013
Black Hat West Coast Trainings Early Registration Deadline Today
Products and Releases  |  10/24/2013  | 
The event, covering the latest InfoSec research and intelligence, will take place take place Dec. 9-12
IBM Study: Security Officers Gaining a Strategic Voice, Transforming Technology And Business In Global Organizations
Products and Releases  |  10/24/2013  | 
Three-fourths of security leaders have deployed cloud security services; mobile security most recently deployed technology
Malwarebytes Growth Validates Need For Zero-Day Protection
Products and Releases  |  10/23/2013  | 
Malwarebytes has had a busy year
Alert Logic Cloud Security Report Warns Energy Sector Of Threats
Products and Releases  |  10/23/2013  | 
Energy sector is at an elevated risk of brute force and malware/botnet attacks
Bromium Announces $40M Series C Funding
Products and Releases  |  10/23/2013  | 
New funding will be used for continued product development
Prolexic Releases Q3 Global Attack Report
Products and Releases  |  10/23/2013  | 
DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities
SailPoint, Identity Team For Mobile Device Security Efforts
Products and Releases  |  10/23/2013  | 
MDM integration allows organizations to extend IAM policies and controls to personal mobile devices
Service Objects Helps Online Retailers Fight Fraud This Holiday Season
Products and Releases  |  10/22/2013  | 
Adds ability to detect TOR network users to DOTS IP Address Validation product
BeyondTrust Survey Reveals Privileged Users Are Out Of Control
Products and Releases  |  10/22/2013  | 
Latest survey findings illustrate that insider threats continue to be a serious threat vector for organizations
IBM Protects Clients From Security Attacks With New Cloud Solution
Products and Releases  |  10/22/2013  | 
New software and services are based on a partnership with Akamai Technologies
DataMotion Brings Email Encryption Services To Fidelity National Title Group's Settlement Agents
Products and Releases  |  10/22/2013  | 
Partnership enables agents to comply with ALTA best practices for secure data delivery
Panda Security’s Corporate Solutions Now Compatible With Microsoft Windows 8.1 And Windows Server 2012 R2
Products and Releases  |  10/22/2013  | 
Panda Cloud Office Protection and Panda Cloud Systems Management both compatible
Websense Advances Defenses Against Targeted Attacks And APTs
Products and Releases  |  10/22/2013  | 
Enhancements include inline sandboxing defenses, malware isolation, phishing education, and new platform support
ObserveIT Monitors Third Parties And Privileged Users
Products and Releases  |  10/21/2013  | 
ObserveIT 5.6.8 includes new tracking parameters, detailed graphical charts, and DBA auditing
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file