Products and Releases

Content posted in October 2013
Page 1 / 3   >   >>
PCI Security Standards Council's Validated Point-To-Point Encryption Available Now
Products and Releases  |  10/30/2013  | 
European Payment Services (EPS) is the first company to have a solution listed
McAfee And Office Depot Survey Reveals SMBs Have False Sense Of Security
Products and Releases  |  10/30/2013  | 
One of the biggest reveals from the survey was that 14 percent of SMBs haven’t implemented any security measures
New Online Security Course Available To Small Business Owners
Products and Releases  |  10/30/2013  | 
Provides overview on how to secure business information, identify security threats, and guard against cyberattacks
Lockheed Martin Cyber Solution Enables Secure Data Sharing Between Top Secret And Unclassified Security Domains
Products and Releases  |  10/30/2013  | 
Trusted Sentinel controls the release of information commensurate with the security level of the information being processed
Verint Acquires Voice Biometric Company Victrio
Products and Releases  |  10/30/2013  | 
Combined solution joins Victrio's voice biometrics and predictive analytics with Verint's customer-centric workforce optimization (WFO) solutions
New RSA Products and Services Boost Security Operations; Eliminate Security And Compliance Trade-Offs
Products and Releases  |  10/30/2013  | 
new products and services address traditional SIEM requirements as part of a advanced security strategy
Marble Adds Mobile App Management To Mobile Security Platform
Products and Releases  |  10/30/2013  | 
Enables companies to set up and manage an app store/catalog for employees and contractors
NQ Mobile Announces Formation Of Independent Special Committee
Products and Releases  |  10/30/2013  | 
Committee to conduct an independent review of the allegations raised in a report issued by Muddy Waters dated Oct. 24, 2013
Ryan & Maniskas, LLP Announces Investigation Of NQ Mobile Inc.
Products and Releases  |  10/30/2013  | 
Investigation related to allegations that NQ Mobile misrepresented efficacy of product platforms
ForeScout Teams With SAP To Secure BYOD And Complete Enterprise Mobility
Products and Releases  |  10/29/2013  | 
Announce interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms
New AlgoSec Study Uncovers Application Connectivity Management Challenges Are Impacting Security And Business Agility
Products and Releases  |  10/29/2013  | 
Survey findings indicate complexity of critical business application connectivity as well as data center and application cloud migrations
Waterfall Security Introduces FLIP And Modular Solutions, Expands Mission
Products and Releases  |  10/29/2013  | 
Solutions highlight ways that Unidirectional Security Gateway technology can meet the needs of control system admins
Surveillance Issues Overshadow Talks At End Of Internet Governance Forum 2013
Products and Releases  |  10/29/2013  | 
Future of Internet could be shaped by global reaction to surveillance, participants say
Sophos Announces Cloud Strategy And Endpoint Protection Solution
Products and Releases  |  10/29/2013  | 
Sophos Cloud provides endpoint protection
New RSA Security Brief Provides Road Map For Next Generation Security Operations
Products and Releases  |  10/29/2013  | 
Brief authors say most breaches today result from organizations stumbling on basic security practices
Tufin Survey Reveals End-To-End Orchestration Of Network Security Policy Is "Essential For Business Agility"
Products and Releases  |  10/29/2013  | 
Almost nine out of 10 IT and business decision-makers said coordination of security policy across the entire network is "essential"
Avira Revamps Free Mac Security For OS X Mavericks
Products and Releases  |  10/29/2013  | 
New version of Avira Free Mac Security can perform quick scan of vulnerable directories on the computer even as the security software is being installed
CylanceV Exposes Unknown Threats Lurking On Computers Worldwide
Products and Releases  |  10/29/2013  | 
CylanceV mathematically determines what is safe and what is a threat in the broadening spectrum of unknown data
Mobile Biometric Security Products And Services To Generate Over $8.3 Billion Revenue By 2018
Products and Releases  |  10/28/2013  | 
By 2018, 3.4 billion users will be using biometrics on their mobile devices, according to Goode Intelligence
Dell Rolls Out New Security Products
Products and Releases  |  10/28/2013  | 
New products aimed at providing seamless protection of data from the endpoint to the datacenter to the cloud
DB Networks Introduces Industry's Behavioral Analysis-Based Core IDS To Detect Advanced And Zero-Day SQL Injection Attacks
Products and Releases  |  10/28/2013  | 
IDS-6300 intelligent security appliance works passively in the core of the IT infrastructure and is operationally transparent
Symantec Reports Second Quarter Fiscal 2014 Results
Products and Releases  |  10/28/2013  | 
Revenue down 4 percent year-over-year
WhiteHat Security Launches New Customer Support Portal
Products and Releases  |  10/28/2013  | 
From the CSC, customers can log in and track all of their Sentinel support requests
CodeLathe Rolls Out FileCloud 4.0
Products and Releases  |  10/28/2013  | 
New version adds mobile device management capabilities
NetCitadel And Webroot Partner To Bring Security Intelligence To The Enterprise
Products and Releases  |  10/28/2013  | 
NetCitadel will embed Webroot IP Reputation Service into its Threat Management Platform
HID Global And Consortium Partners Receive U.S. Cyber Security Grant For Identity Protection Pilot
Products and Releases  |  10/28/2013  | 
Consortium will incorporate identity and attribute verification technology contained in variety of form factors
Integralis Completes Name Change To NTT Com Security
Products and Releases  |  10/28/2013  | 
Will continue promoting its portfolio of managed security, business infrastructure, consulting, and technology integration services
Alleged Hacker Indicted In New Jersey For Data Breach
Products and Releases  |  10/28/2013  | 
Investigation led by the U.S. Army Criminal Investigation Command-Computer Crime Investigative Unit and the FBI in Newark revealed that Lauri Love allegedly illegally infiltrated U.S. government computer systems
Baidu Antivirus Is First To Eliminate Malicious Virut Botnet
Products and Releases  |  10/25/2013  | 
Infected computers can become hosts for DDoS attacks, spam, fraud, data theft, and illicit pay-per-install activities
Net Orbit Exposes Slacker Employees On Company Networks
Products and Releases  |  10/25/2013  | 
Software allows managers to seamlessly monitor and control client workstations
IBM Labs Develops New Method For Securing Data Before It Goes To The Cloud
Products and Releases  |  10/25/2013  | 
Technique helps overcome security concerns by redacting, removing, or replacing sensitive data from records that are being sent to the cloud for processing
Not Your Father's IPS: SANS Releases Results On Its Network Security Survey
Products and Releases  |  10/25/2013  | 
Results indicate that respondents want and need more information than their traditional IPS will give
Nominum Launches Vantio ThreatAvert To Protect Fixed And Mobile Networks
Products and Releases  |  10/25/2013  | 
Prevents and neutralizes attacks on internal resources, such as routers, DNS servers, gateways, and EPC resources
Bitdefender Introduces Tech Assist
Products and Releases  |  10/25/2013  | 
Tech Assist provides direct problem-solving, 24 hours a day
WatchGuard Technologies Extends Email And Web Gateway Security Features
Products and Releases  |  10/24/2013  | 
WatchGuard XCS 10 adds Microsoft Hyper-V support, expands IPv6 capabilities, and enables custom policy enhancements
Santa Clara Ranks #1 In The U.S. For Online Fraud Origination
Products and Releases  |  10/24/2013  | 
ThreatMetrix reviewed activity from Q3 2013
Black Hat West Coast Trainings Early Registration Deadline Today
Products and Releases  |  10/24/2013  | 
The event, covering the latest InfoSec research and intelligence, will take place take place Dec. 9-12
IBM Study: Security Officers Gaining a Strategic Voice, Transforming Technology And Business In Global Organizations
Products and Releases  |  10/24/2013  | 
Three-fourths of security leaders have deployed cloud security services; mobile security most recently deployed technology
Malwarebytes Growth Validates Need For Zero-Day Protection
Products and Releases  |  10/23/2013  | 
Malwarebytes has had a busy year
Alert Logic Cloud Security Report Warns Energy Sector Of Threats
Products and Releases  |  10/23/2013  | 
Energy sector is at an elevated risk of brute force and malware/botnet attacks
Bromium Announces $40M Series C Funding
Products and Releases  |  10/23/2013  | 
New funding will be used for continued product development
Prolexic Releases Q3 Global Attack Report
Products and Releases  |  10/23/2013  | 
DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities
SailPoint, Identity Team For Mobile Device Security Efforts
Products and Releases  |  10/23/2013  | 
MDM integration allows organizations to extend IAM policies and controls to personal mobile devices
Service Objects Helps Online Retailers Fight Fraud This Holiday Season
Products and Releases  |  10/22/2013  | 
Adds ability to detect TOR network users to DOTS IP Address Validation product
BeyondTrust Survey Reveals Privileged Users Are Out Of Control
Products and Releases  |  10/22/2013  | 
Latest survey findings illustrate that insider threats continue to be a serious threat vector for organizations
IBM Protects Clients From Security Attacks With New Cloud Solution
Products and Releases  |  10/22/2013  | 
New software and services are based on a partnership with Akamai Technologies
DataMotion Brings Email Encryption Services To Fidelity National Title Group's Settlement Agents
Products and Releases  |  10/22/2013  | 
Partnership enables agents to comply with ALTA best practices for secure data delivery
Panda Security’s Corporate Solutions Now Compatible With Microsoft Windows 8.1 And Windows Server 2012 R2
Products and Releases  |  10/22/2013  | 
Panda Cloud Office Protection and Panda Cloud Systems Management both compatible
Websense Advances Defenses Against Targeted Attacks And APTs
Products and Releases  |  10/22/2013  | 
Enhancements include inline sandboxing defenses, malware isolation, phishing education, and new platform support
ObserveIT Monitors Third Parties And Privileged Users
Products and Releases  |  10/21/2013  | 
ObserveIT 5.6.8 includes new tracking parameters, detailed graphical charts, and DBA auditing
Page 1 / 3   >   >>


13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.