Products and Releases

Content posted in October 2014
Page 1 / 2   >   >>
Merchants Set Record Straight on Cybersecurity and Payments
Products and Releases  |  10/30/2014  | 
RILA, NACS, NRF, NGA, FMI and MAG send letter to Credit Unions
NEW: Home Depot breach cost credit unions nearly $60M
Products and Releases  |  10/30/2014  | 
Target breach cost credit unions nearly $30 million.
Cigital Acquiring Security Testing-as-a-Service Provider iViZ Security
Products and Releases  |  10/28/2014  | 
Cigital leverages iViZ to introduce 3D Unlimited Application Security Testing
Georgia Tech Releases 2015 Emerging Cyber Threats Report
Products and Releases  |  10/28/2014  | 
Keynote will be delivered by Dave Aitel, CEO of Immunity Inc., at GA Tech conference.
Identifying Jailbroken iPhones/rooted Android Phones To Stop Fraud
Products and Releases  |  10/28/2014  | 
Award-winning mobile SDK enhancements identify jailbroken and rooted devices, expose location and device/operating system mismatches
Tripwire Announces Adaptive Threat Protection
Products and Releases  |  10/28/2014  | 
Tripwire Enterprise and IP360 integration delivers integrated, automated view of cybersecurity risk
Tufin delivers end-to-end change automation for Check Point, Cisco and Juniper firewalls
Products and Releases  |  10/22/2014  | 
Version R14-3 of the Tufin Orchestration Suite Enables SDN-Equivalent Agility for Network Security Infrastructure
Illumio Brings Adaptive Security to Morgan Stanley, Plantronics, Creative Artists Agency, Yahoo and NTT I3
Products and Releases  |  10/22/2014  | 
Startup reinvents security for 100 million+ undersecured physical and virtual servers in private data centers and public clouds
Workers put off mobile business apps due to password complications and network security fears
Products and Releases  |  10/22/2014  | 
Wide-scale survey shows almost a third of workers are put off accessing business-critical apps and reveals employees are frustrated by long, complex passwords
New Option for Enterprise to Cloud
Products and Releases  |  10/22/2014  | 
Radical new technology is backed by corporations, including GE and Qualcomm, as well as leading venture firms Andreessen Horowitz, Norwest Venture Partners, Sutter Hill Ventures and ARTIS Ventures
Application Data Control to secure IT/OT communications
Products and Releases  |  10/22/2014  | 
Stronger-than-firewall technology delivers on what industrial and next-gen firewalls promise
ISA Supports Treasury Initiative on Cybersecurity Incentives
Products and Releases  |  10/21/2014  | 
The Committee will meet for the first time next month to discuss cybersecurity insurance.
Zscaler Expands Partner Ecosystem
Products and Releases  |  10/21/2014  | 
Zscalers Security as a Service Platform Integrates with Complementary Solutions to Help Enterprises Maximize their Security Investment
White Ops Names Former RSA CISO as President and Chief Operating Officer
Products and Releases  |  10/20/2014  | 
Eddie Schwartz Brings More Than 25 Years of Expertise, From Building Companies to Managing Global Security Needs of Fortune 100 and Government Organizations
Netwrix Helps Detect Insider Threats and Prevent Security Breaches with Launch of Netwrix Auditor 6.5
Products and Releases  |  10/20/2014  | 
Leading Change and Configuration Auditing Platform Provides Complete Visibility and Ensures that Sensitive Data Is under Permanent Control
Vorstack Accelerates Adoption of Threat Intelligence Strategies with 5.0 Launch
Products and Releases  |  10/20/2014  | 
ISAC Members can shorten Time to Discovery with Vorstack Automation and Collaboration Platform
Telco Systems Unveils First Two TelcoApps to Deliver Virtualized Firewall and Routing Network Functions for Telecom Networks
Products and Releases  |  10/20/2014  | 
New apps run over CloudMetro platforms virtualized engine, simplifying VNF execution and management
Staying Ahead of DDoS Attacks
Products and Releases  |  10/20/2014  | 
NSFOCUS Unveils Robust Anti-DDoS Solution for Hosting Service Providers, Data Centers and MSSPs
Visa launching major chip education effort
Products and Releases  |  10/17/2014  | 
Visa study finds more than half of consumers and two-thirds of merchants are aware of chip technology; one-third of consumers who are aware of chips security benefits cite preference for shopping at chip merchants; four-in-five merchants say chip readers would benefit their businesses
VM-Series Brings Next-Gen Security to Cloud
Products and Releases  |  10/16/2014  | 
Protects Private, Hybrid and Now Public Cloud-Computing Environments from Todays Advanced Cyber Threats
Alert Logic Introduces ActiveWatch For Alert Logic Log Manager
Products and Releases  |  10/15/2014  | 
New managed service debuts.
Risk I/O Appoints Security Veteran Karim Toubba as CEO
Products and Releases  |  10/14/2014  | 
Company also announces additional Series A funding.
Duo Security Introduces API Edition of Its Two-Factor Authentication Service
Products and Releases  |  10/14/2014  | 
Enables Developers to Quickly Add Strong Authentication to Web and Mobile Apps
Novetta Leads Malware Interdiction w Partners Microsoft, FireEye, Cisco, & More!
Products and Releases  |  10/14/2014  | 
Coalition Seeks to Move Beyond Singular Threat Reporting toward Large-scale Proactive and Cooperative Interdiction Efforts Against Threat Groups
Luxembourg Firm Unveils Solutions Restoring Internet Communications Privacy
Products and Releases  |  10/13/2014  | 
pEp Security SA bundle fully removes Internet surveillance for individual and corporate users, seamlessly within existing communications programs and tools.
Ping Identity partners with Sprint to offer single sign-on for Google Apps
Products and Releases  |  10/13/2014  | 
Mobile Collaboration Just Got Easier with Sprint and Google Apps for Work
CipherCloud announces advancement on world's leading enterprise apps marketplace
Products and Releases  |  10/13/2014  | 
Customers can now quickly access and apply industry-specific solutions to meet data privacy and compliance needs
Impervas Fifth Annual Web Application Attack Report Reveals That Malicious Traffic and Web Attacks Have Significantly Increased
Products and Releases  |  10/10/2014  | 
Retail Applications, Websites Containing Consumer Information and WordPress are Todays Biggest Attack Targets
Symantec Announces New Strategy to Fuel Growth and Plans to Separate into Two Public Industry-Leading Technology Companies
Products and Releases  |  10/10/2014  | 
Bank of America is Best Overall, While Union Bank and Ally Bank Rank in Top Awards Too
Alleged Russian Cyber-Criminal Now Charged in 40-Count Superseding Indictment
Products and Releases  |  10/10/2014  | 
New counts emerge.
Onapsis Research Labs details seven new critical security advisories for businesses using SAP HANA and SAP BusinessObjects
Products and Releases  |  10/10/2014  | 
New threats identified by international team of security experts includes high risk vulnerability in SAP HANA database
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response
Products and Releases  |  10/10/2014  | 
Technology uses existing log repository data to track user behavior, detect and qualify threats not recognized by SIEM
Spam Email Disrupts Two-Thirds of Businesses Each Year
Products and Releases  |  10/10/2014  | 
ndependent research commissioned by GFI Software shows negative impact on US businesses from malware attacks, phishing scams and data thefts
AlgoSec First to Unify Security Policy Management Across In Hybrid Cloud Environments
Products and Releases  |  10/10/2014  | 
Support for Amazon Web Services Delivers Comprehensive Visibility, Auditing and Streamlined Policy Management
Javelin Research Unveils Identity Safety in Banking Scorecard
Products and Releases  |  10/10/2014  | 
Bank of America is Best Overall, While Union Bank and Ally Bank Rank in Top Awards Too
Arbor Networks ATLAS Data Shows Reflection DDoS Attacks Continue to be Significant in Q3 2014
Products and Releases  |  10/9/2014  | 
133 attacks over 100Gbps so far in 2014; 22 recorded in Q3
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response
Products and Releases  |  10/6/2014  | 
Technology uses existing log repository data to track user behavior, detect and qualify threats not recognized by SIEM
TraceSecurity Announces Integration Partnership with Information Shield
Products and Releases  |  10/3/2014  | 
Relationship Delivers Seamless Integration between TraceCSO and the Common Policy Library (CPL)
Tripwire Enterprise App for Splunk Strengthens Cyberthreat Protection
Products and Releases  |  10/3/2014  | 
App offers actionable, real-time security for business critical assets
Fortscale Introduces User Behavior Analytics Solution That Enhances Security Teams User-Related Threat Mitigation
Products and Releases  |  10/3/2014  | 
Company announces general availability of user threats-centric, machine learning approach to enterprise security
Java Coding Guidelines: Now Available Free Online
Products and Releases  |  10/3/2014  | 
CERT Division of the Software Engineering Institute at Carnegie Mellon University identified best coding practices
ESET Launches Flagship NOD32 Antivirus 8 and Smart Security 8
Products and Releases  |  10/3/2014  | 
New Products Includes Botnet Protection Combined with Enhanced Exploit Blocker
Arxan Provides Secure Cryptography for Cloud-Based Mobile Wallets and Payments
Products and Releases  |  10/3/2014  | 
Security for mobile commerce.
CertainSafe Releases Enhancements to its MicroTokenized File Sharing Service
Products and Releases  |  10/3/2014  | 
New security and productivity features include time-based shredding, file-copying and file sharing enhancements
Adallom Announces Next Generation Cloud-Based Enterprise Information Governance
Products and Releases  |  10/3/2014  | 
Adallom joins forces with Salesforce.com to provide specialized enterprise information governance, compliance, and security as-a-service
Page 1 / 2   >   >>


13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.