Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in October 2013
<<   <   Page 3 / 3
Free Cloud Identity Service Delivers Single Sign-On In Minutes
Products and Releases  |  10/9/2013  | 
PingOne for Groups is a free subscription for up to five applications and 50 users
Venafi Launches New Threat Center
Products and Releases  |  10/9/2013  | 
Center to focus on the increase in trust-based attacks and their impact on Global 2000 enterprises
SecureKey Divests Hardware Security Token Group
Products and Releases  |  10/9/2013  | 
Kili Technology was founded by SecureKey Chairman Greg Wolfond with funding from Toronto-based Blue Sky Capital
Novell Announces Strategic Partnership With MobileIron For Secure Mobile File Access
Products and Releases  |  10/9/2013  | 
Deal will enable secure mobile file access and sharing through Novell Filr and MobileIron AppConnect
UINT & Mereal Biometrics Launches Biometric Smart Card With Embedded FPC Fingerprint Touch Sensor And Processor
Products and Releases  |  10/8/2013  | 
First applications of the card are physical and logical access control for French Casino Operator Partouche
Fujitsu Computer Products Of America Launches iNetSec Smart Finder For Network Security And BYOD Management
Products and Releases  |  10/8/2013  | 
Smart Finder incorporates both NAC and IPS features into a hybrid product
BeyondTrust Releases Network Security Scanner With Unlimited Vulnerability Assessment And Compliance Reporting
Products and Releases  |  10/8/2013  | 
Retina Network Security Scanner includes targeted scan profiles for security, compliance, and systems administrators
SecureBuy Develops Technology To Advance 3-D Secure/Payer Authentication Process
Products and Releases  |  10/8/2013  | 
Addresses issue of merchants retaining liability for transactions even after receiving "authenticated" 3-D Secure response code from cardholders' issuing bank at time of authentication
Splunk Enterprise 6 Bridges Data Divide
Products and Releases  |  10/8/2013  | 
Splunk Enterprise 6 introduces three innovations
HITRUST And THSA Partner To Help Texas Take The Lead In Efforts To Ensure Health Information Is Secure
Products and Releases  |  10/8/2013  | 
HITRUST was awarded the exclusive contract to provide certification recommendation and related services
Marble Updates Next Generation Mobile Security Cloud Service
Products and Releases  |  10/8/2013  | 
New features include advanced mobile app scanning, secure browsing, real-time analytics, and essential mobile device management (MDM) capabilities
Splunk Announces General Availability Of Splunk Cloud
Products and Releases  |  10/8/2013  | 
Splunk Cloud, powered by Amazon Web Services, includes access to all features of the Splunk Enterprise platform
Hexis Cyber Solutions Launches Intelligent Active Defense Solution
Products and Releases  |  10/8/2013  | 
HawkEye G detects attacks, and then applying automated countermeasures to remove them
Unisys Announces Stealth Solution To Protect Enterprises From Mobile Cyberthreats
Products and Releases  |  10/8/2013  | 
Stealth for Mobile combines Unisys Stealth technology with application wrapping security software that allows users to define specific security policies on a per-application basis
Identity Theft Resource Center: Identity Theft Resource Center Has Free Resources Available For Consumers
Products and Releases  |  10/7/2013  | 
ITRC Victim Assistance Call Center is ready to assist callers who may be faced with issues of identity theft during the government shutdown
Datacastle Announces Support For Cloud Sync And Share Services
Products and Releases  |  10/7/2013  | 
DatacastleREDv6 includes integration with Sync-and-Share services like Google Drive and DropBox
Fortinet Unveils Data Center Firewall Appliance
Products and Releases  |  10/7/2013  | 
FortiGate-3700D delivers 100 Gbps+ firewall throughput and 40 GbE ports in a compact appliance
73 Percent Of Organizations Fail To Block Privileged User Access To Sensitive Data
Products and Releases  |  10/7/2013  | 
Results show that the primary concerns for IT decision makers are around cloud security and insider threats
Webroot Unveils New SecureAnywhere For Home Users
Products and Releases  |  10/7/2013  | 
Webroot SecureAnywhere includes a new threat detection engine that analyzes unknown files before allowing them to run
SSL Certificate Provider HydrantID Adopts Authentify's Authentication Services
Products and Releases  |  10/7/2013  | 
Authentify delivers its phone-based authentication work flows as a Web service
Emulex Introduces High Performance NetFlow Generator Appliance For Enterprise, Cloud, Security And Mobile Deployments
Products and Releases  |  10/4/2013  | 
EndaceFlow 3040 built for use with high-density 10Gb Ethernet (10GbE) networks
Visa Announces Improved Payment Card Fraud Detection
Products and Releases  |  10/4/2013  | 
Advanced Authorization model includes more transactional history data, along with additional neural networks to analyze that data
Secure Mentem Releases National Cyber Security Awareness Month Support Package
Products and Releases  |  10/3/2013  | 
Materials include: daily tips, posters, newsletters, and videos
McAfee Delivers Situational Awareness With Enhanced SIEM
Products and Releases  |  10/2/2013  | 
Integrates data management capabilities of McAfee Enterprise Security Manager (ESM) with endpoint insight of McAfee Real Time
McAfee Offers Solution To Remediate Advanced Malware
Products and Releases  |  10/2/2013  | 
McAfee Advanced Threat Defense and McAfee Real Time are part of the McAfee Security Connected framework
Bots Beware: White Ops Launches New Technology To Distinguish Computers Used By Actual Humans From Those Taken Over By "Bots" Defrauding Advertisers
Products and Releases  |  10/1/2013  | 
Solution introduces "Cost per Human," the real cost of reaching humans who will ultimately buy products or services
Malwarebytes Launches New Technician Product
Products and Releases  |  10/1/2013  | 
Techbench automatically scans and removes advanced rootkits, Trojans, spywares, worms, and other malicious software
Online Trust Alliance Embraces National Cyber Security Awareness Month
Products and Releases  |  10/1/2013  | 
Announces three-part initiative to advance industry self-regulatory efforts
Arbor Networks Strengthens Network Intelligence Solution
Products and Releases  |  10/1/2013  | 
Peakflow SP 6.0 combines network-wide anomaly detection and traffic engineering with carrier-class threat management
Experian To Acquire Device Identification Leader 41st Parameter
Products and Releases  |  10/1/2013  | 
41st Parameter will strengthen Experian's global Web fraud detection and risk-based identity authentication capabilities
Panorama9 Updates MSP Partner Program
Products and Releases  |  10/1/2013  | 
Additions include new team collaboration tools, user management permissions, deeper Zendesk integration
<<   <   Page 3 / 3

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-01
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.
PUBLISHED: 2022-07-01
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
PUBLISHED: 2022-07-01
PDFAlto v0.4 was discovered to contain a heap buffer overflow via the component /pdfalto/src/pdfalto.cc.
PUBLISHED: 2022-07-01
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.