Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in October 2014
Page 1 / 2   >   >>
Merchants Set Record Straight on Cybersecurity and Payments
Products and Releases  |  10/30/2014  | 
RILA, NACS, NRF, NGA, FMI and MAG send letter to Credit Unions
NEW: Home Depot breach cost credit unions nearly $60M
Products and Releases  |  10/30/2014  | 
Target breach cost credit unions nearly $30 million.
Cigital Acquiring Security Testing-as-a-Service Provider iViZ Security
Products and Releases  |  10/28/2014  | 
Cigital leverages iViZ to introduce 3D Unlimited Application Security Testing
Georgia Tech Releases 2015 Emerging Cyber Threats Report
Products and Releases  |  10/28/2014  | 
Keynote will be delivered by Dave Aitel, CEO of Immunity Inc., at GA Tech conference.
Identifying Jailbroken iPhones/rooted Android Phones To Stop Fraud
Products and Releases  |  10/28/2014  | 
Award-winning mobile SDK enhancements identify jailbroken and rooted devices, expose location and device/operating system mismatches
Tripwire Announces Adaptive Threat Protection
Products and Releases  |  10/28/2014  | 
Tripwire Enterprise and IP360 integration delivers integrated, automated view of cybersecurity risk
Tufin delivers end-to-end change automation for Check Point, Cisco and Juniper firewalls
Products and Releases  |  10/22/2014  | 
Version R14-3 of the Tufin Orchestration Suite Enables SDN-Equivalent Agility for Network Security Infrastructure
Illumio Brings Adaptive Security to Morgan Stanley, Plantronics, Creative Artists Agency, Yahoo and NTT I3
Products and Releases  |  10/22/2014  | 
Startup reinvents security for 100 million+ undersecured physical and virtual servers in private data centers and public clouds
Workers put off mobile business apps due to password complications and network security fears
Products and Releases  |  10/22/2014  | 
Wide-scale survey shows almost a third of workers are put off accessing business-critical apps and reveals employees are frustrated by long, complex passwords
New Option for Enterprise to Cloud
Products and Releases  |  10/22/2014  | 
Radical new technology is backed by corporations, including GE and Qualcomm, as well as leading venture firms Andreessen Horowitz, Norwest Venture Partners, Sutter Hill Ventures and ARTIS Ventures
Application Data Control to secure IT/OT communications
Products and Releases  |  10/22/2014  | 
Stronger-than-firewall technology delivers on what industrial and next-gen firewalls promise
ISA Supports Treasury Initiative on Cybersecurity Incentives
Products and Releases  |  10/21/2014  | 
The Committee will meet for the first time next month to discuss cybersecurity insurance.
Zscaler Expands Partner Ecosystem
Products and Releases  |  10/21/2014  | 
Zscalers Security as a Service Platform Integrates with Complementary Solutions to Help Enterprises Maximize their Security Investment
White Ops Names Former RSA CISO as President and Chief Operating Officer
Products and Releases  |  10/20/2014  | 
Eddie Schwartz Brings More Than 25 Years of Expertise, From Building Companies to Managing Global Security Needs of Fortune 100 and Government Organizations
Netwrix Helps Detect Insider Threats and Prevent Security Breaches with Launch of Netwrix Auditor 6.5
Products and Releases  |  10/20/2014  | 
Leading Change and Configuration Auditing Platform Provides Complete Visibility and Ensures that Sensitive Data Is under Permanent Control
Vorstack Accelerates Adoption of Threat Intelligence Strategies with 5.0 Launch
Products and Releases  |  10/20/2014  | 
ISAC Members can shorten Time to Discovery with Vorstack Automation and Collaboration Platform
Telco Systems Unveils First Two TelcoApps to Deliver Virtualized Firewall and Routing Network Functions for Telecom Networks
Products and Releases  |  10/20/2014  | 
New apps run over CloudMetro platforms virtualized engine, simplifying VNF execution and management
Staying Ahead of DDoS Attacks
Products and Releases  |  10/20/2014  | 
NSFOCUS Unveils Robust Anti-DDoS Solution for Hosting Service Providers, Data Centers and MSSPs
Visa launching major chip education effort
Products and Releases  |  10/17/2014  | 
Visa study finds more than half of consumers and two-thirds of merchants are aware of chip technology; one-third of consumers who are aware of chips security benefits cite preference for shopping at chip merchants; four-in-five merchants say chip readers would benefit their businesses
VM-Series Brings Next-Gen Security to Cloud
Products and Releases  |  10/16/2014  | 
Protects Private, Hybrid and Now Public Cloud-Computing Environments from Todays Advanced Cyber Threats
Alert Logic Introduces ActiveWatch For Alert Logic Log Manager
Products and Releases  |  10/15/2014  | 
New managed service debuts.
Risk I/O Appoints Security Veteran Karim Toubba as CEO
Products and Releases  |  10/14/2014  | 
Company also announces additional Series A funding.
Duo Security Introduces API Edition of Its Two-Factor Authentication Service
Products and Releases  |  10/14/2014  | 
Enables Developers to Quickly Add Strong Authentication to Web and Mobile Apps
Novetta Leads Malware Interdiction w Partners Microsoft, FireEye, Cisco, & More!
Products and Releases  |  10/14/2014  | 
Coalition Seeks to Move Beyond Singular Threat Reporting toward Large-scale Proactive and Cooperative Interdiction Efforts Against Threat Groups
Luxembourg Firm Unveils Solutions Restoring Internet Communications Privacy
Products and Releases  |  10/13/2014  | 
pEp Security SA bundle fully removes Internet surveillance for individual and corporate users, seamlessly within existing communications programs and tools.
Ping Identity partners with Sprint to offer single sign-on for Google Apps
Products and Releases  |  10/13/2014  | 
Mobile Collaboration Just Got Easier with Sprint and Google Apps for Work
CipherCloud announces advancement on world's leading enterprise apps marketplace
Products and Releases  |  10/13/2014  | 
Customers can now quickly access and apply industry-specific solutions to meet data privacy and compliance needs
Symantec Announces New Strategy to Fuel Growth and Plans to Separate into Two Public Industry-Leading Technology Companies
Products and Releases  |  10/10/2014  | 
Bank of America is Best Overall, While Union Bank and Ally Bank Rank in Top Awards Too
Impervas Fifth Annual Web Application Attack Report Reveals That Malicious Traffic and Web Attacks Have Significantly Increased
Products and Releases  |  10/10/2014  | 
Retail Applications, Websites Containing Consumer Information and WordPress are Todays Biggest Attack Targets
Alleged Russian Cyber-Criminal Now Charged in 40-Count Superseding Indictment
Products and Releases  |  10/10/2014  | 
New counts emerge.
Onapsis Research Labs details seven new critical security advisories for businesses using SAP HANA and SAP BusinessObjects
Products and Releases  |  10/10/2014  | 
New threats identified by international team of security experts includes high risk vulnerability in SAP HANA database
AlgoSec First to Unify Security Policy Management Across In Hybrid Cloud Environments
Products and Releases  |  10/10/2014  | 
Support for Amazon Web Services Delivers Comprehensive Visibility, Auditing and Streamlined Policy Management
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response
Products and Releases  |  10/10/2014  | 
Technology uses existing log repository data to track user behavior, detect and qualify threats not recognized by SIEM
Spam Email Disrupts Two-Thirds of Businesses Each Year
Products and Releases  |  10/10/2014  | 
ndependent research commissioned by GFI Software shows negative impact on US businesses from malware attacks, phishing scams and data thefts
Javelin Research Unveils Identity Safety in Banking Scorecard
Products and Releases  |  10/10/2014  | 
Bank of America is Best Overall, While Union Bank and Ally Bank Rank in Top Awards Too
Arbor Networks ATLAS Data Shows Reflection DDoS Attacks Continue to be Significant in Q3 2014
Products and Releases  |  10/9/2014  | 
133 attacks over 100Gbps so far in 2014; 22 recorded in Q3
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response
Products and Releases  |  10/6/2014  | 
Technology uses existing log repository data to track user behavior, detect and qualify threats not recognized by SIEM
TraceSecurity Announces Integration Partnership with Information Shield
Products and Releases  |  10/3/2014  | 
Relationship Delivers Seamless Integration between TraceCSO and the Common Policy Library (CPL)
Tripwire Enterprise App for Splunk Strengthens Cyberthreat Protection
Products and Releases  |  10/3/2014  | 
App offers actionable, real-time security for business critical assets
Fortscale Introduces User Behavior Analytics Solution That Enhances Security Teams User-Related Threat Mitigation
Products and Releases  |  10/3/2014  | 
Company announces general availability of user threats-centric, machine learning approach to enterprise security
Java Coding Guidelines: Now Available Free Online
Products and Releases  |  10/3/2014  | 
CERT Division of the Software Engineering Institute at Carnegie Mellon University identified best coding practices
ESET Launches Flagship NOD32 Antivirus 8 and Smart Security 8
Products and Releases  |  10/3/2014  | 
New Products Includes Botnet Protection Combined with Enhanced Exploit Blocker
Arxan Provides Secure Cryptography for Cloud-Based Mobile Wallets and Payments
Products and Releases  |  10/3/2014  | 
Security for mobile commerce.
CertainSafe Releases Enhancements to its MicroTokenized File Sharing Service
Products and Releases  |  10/3/2014  | 
New security and productivity features include time-based shredding, file-copying and file sharing enhancements
Adallom Announces Next Generation Cloud-Based Enterprise Information Governance
Products and Releases  |  10/3/2014  | 
Adallom joins forces with Salesforce.com to provide specialized enterprise information governance, compliance, and security as-a-service
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.