Products and Releases

Content posted in October 2014
Page 1 / 2   >   >>
Merchants Set Record Straight on Cybersecurity and Payments
Products and Releases  |  10/30/2014  | 
RILA, NACS, NRF, NGA, FMI and MAG send letter to Credit Unions
NEW: Home Depot breach cost credit unions nearly $60M
Products and Releases  |  10/30/2014  | 
Target breach cost credit unions nearly $30 million.
Cigital Acquiring Security Testing-as-a-Service Provider iViZ Security
Products and Releases  |  10/28/2014  | 
Cigital leverages iViZ to introduce 3D Unlimited Application Security Testing
Georgia Tech Releases 2015 Emerging Cyber Threats Report
Products and Releases  |  10/28/2014  | 
Keynote will be delivered by Dave Aitel, CEO of Immunity Inc., at GA Tech conference.
Identifying Jailbroken iPhones/rooted Android Phones To Stop Fraud
Products and Releases  |  10/28/2014  | 
Award-winning mobile SDK enhancements identify jailbroken and rooted devices, expose location and device/operating system mismatches
Tripwire Announces Adaptive Threat Protection
Products and Releases  |  10/28/2014  | 
Tripwire Enterprise and IP360 integration delivers integrated, automated view of cybersecurity risk
Tufin delivers end-to-end change automation for Check Point, Cisco and Juniper firewalls
Products and Releases  |  10/22/2014  | 
Version R14-3 of the Tufin Orchestration Suite Enables SDN-Equivalent Agility for Network Security Infrastructure
Illumio Brings Adaptive Security to Morgan Stanley, Plantronics, Creative Artists Agency, Yahoo and NTT I3
Products and Releases  |  10/22/2014  | 
Startup reinvents security for 100 million+ undersecured physical and virtual servers in private data centers and public clouds
Workers put off mobile business apps due to password complications and network security fears
Products and Releases  |  10/22/2014  | 
Wide-scale survey shows almost a third of workers are put off accessing business-critical apps and reveals employees are frustrated by long, complex passwords
New Option for Enterprise to Cloud
Products and Releases  |  10/22/2014  | 
Radical new technology is backed by corporations, including GE and Qualcomm, as well as leading venture firms Andreessen Horowitz, Norwest Venture Partners, Sutter Hill Ventures and ARTIS Ventures
Application Data Control to secure IT/OT communications
Products and Releases  |  10/22/2014  | 
Stronger-than-firewall technology delivers on what industrial and next-gen firewalls promise
ISA Supports Treasury Initiative on Cybersecurity Incentives
Products and Releases  |  10/21/2014  | 
The Committee will meet for the first time next month to discuss cybersecurity insurance.
Zscaler Expands Partner Ecosystem
Products and Releases  |  10/21/2014  | 
Zscalers Security as a Service Platform Integrates with Complementary Solutions to Help Enterprises Maximize their Security Investment
White Ops Names Former RSA CISO as President and Chief Operating Officer
Products and Releases  |  10/20/2014  | 
Eddie Schwartz Brings More Than 25 Years of Expertise, From Building Companies to Managing Global Security Needs of Fortune 100 and Government Organizations
Netwrix Helps Detect Insider Threats and Prevent Security Breaches with Launch of Netwrix Auditor 6.5
Products and Releases  |  10/20/2014  | 
Leading Change and Configuration Auditing Platform Provides Complete Visibility and Ensures that Sensitive Data Is under Permanent Control
Vorstack Accelerates Adoption of Threat Intelligence Strategies with 5.0 Launch
Products and Releases  |  10/20/2014  | 
ISAC Members can shorten Time to Discovery with Vorstack Automation and Collaboration Platform
Telco Systems Unveils First Two TelcoApps to Deliver Virtualized Firewall and Routing Network Functions for Telecom Networks
Products and Releases  |  10/20/2014  | 
New apps run over CloudMetro platforms virtualized engine, simplifying VNF execution and management
Staying Ahead of DDoS Attacks
Products and Releases  |  10/20/2014  | 
NSFOCUS Unveils Robust Anti-DDoS Solution for Hosting Service Providers, Data Centers and MSSPs
Visa launching major chip education effort
Products and Releases  |  10/17/2014  | 
Visa study finds more than half of consumers and two-thirds of merchants are aware of chip technology; one-third of consumers who are aware of chips security benefits cite preference for shopping at chip merchants; four-in-five merchants say chip readers would benefit their businesses
VM-Series Brings Next-Gen Security to Cloud
Products and Releases  |  10/16/2014  | 
Protects Private, Hybrid and Now Public Cloud-Computing Environments from Todays Advanced Cyber Threats
Alert Logic Introduces ActiveWatch For Alert Logic Log Manager
Products and Releases  |  10/15/2014  | 
New managed service debuts.
Risk I/O Appoints Security Veteran Karim Toubba as CEO
Products and Releases  |  10/14/2014  | 
Company also announces additional Series A funding.
Duo Security Introduces API Edition of Its Two-Factor Authentication Service
Products and Releases  |  10/14/2014  | 
Enables Developers to Quickly Add Strong Authentication to Web and Mobile Apps
Novetta Leads Malware Interdiction w Partners Microsoft, FireEye, Cisco, & More!
Products and Releases  |  10/14/2014  | 
Coalition Seeks to Move Beyond Singular Threat Reporting toward Large-scale Proactive and Cooperative Interdiction Efforts Against Threat Groups
Luxembourg Firm Unveils Solutions Restoring Internet Communications Privacy
Products and Releases  |  10/13/2014  | 
pEp Security SA bundle fully removes Internet surveillance for individual and corporate users, seamlessly within existing communications programs and tools.
Ping Identity partners with Sprint to offer single sign-on for Google Apps
Products and Releases  |  10/13/2014  | 
Mobile Collaboration Just Got Easier with Sprint and Google Apps for Work
CipherCloud announces advancement on world's leading enterprise apps marketplace
Products and Releases  |  10/13/2014  | 
Customers can now quickly access and apply industry-specific solutions to meet data privacy and compliance needs
Impervas Fifth Annual Web Application Attack Report Reveals That Malicious Traffic and Web Attacks Have Significantly Increased
Products and Releases  |  10/10/2014  | 
Retail Applications, Websites Containing Consumer Information and WordPress are Todays Biggest Attack Targets
Symantec Announces New Strategy to Fuel Growth and Plans to Separate into Two Public Industry-Leading Technology Companies
Products and Releases  |  10/10/2014  | 
Bank of America is Best Overall, While Union Bank and Ally Bank Rank in Top Awards Too
Alleged Russian Cyber-Criminal Now Charged in 40-Count Superseding Indictment
Products and Releases  |  10/10/2014  | 
New counts emerge.
Onapsis Research Labs details seven new critical security advisories for businesses using SAP HANA and SAP BusinessObjects
Products and Releases  |  10/10/2014  | 
New threats identified by international team of security experts includes high risk vulnerability in SAP HANA database
AlgoSec First to Unify Security Policy Management Across In Hybrid Cloud Environments
Products and Releases  |  10/10/2014  | 
Support for Amazon Web Services Delivers Comprehensive Visibility, Auditing and Streamlined Policy Management
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response
Products and Releases  |  10/10/2014  | 
Technology uses existing log repository data to track user behavior, detect and qualify threats not recognized by SIEM
Spam Email Disrupts Two-Thirds of Businesses Each Year
Products and Releases  |  10/10/2014  | 
ndependent research commissioned by GFI Software shows negative impact on US businesses from malware attacks, phishing scams and data thefts
Javelin Research Unveils Identity Safety in Banking Scorecard
Products and Releases  |  10/10/2014  | 
Bank of America is Best Overall, While Union Bank and Ally Bank Rank in Top Awards Too
Arbor Networks ATLAS Data Shows Reflection DDoS Attacks Continue to be Significant in Q3 2014
Products and Releases  |  10/9/2014  | 
133 attacks over 100Gbps so far in 2014; 22 recorded in Q3
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response
Products and Releases  |  10/6/2014  | 
Technology uses existing log repository data to track user behavior, detect and qualify threats not recognized by SIEM
TraceSecurity Announces Integration Partnership with Information Shield
Products and Releases  |  10/3/2014  | 
Relationship Delivers Seamless Integration between TraceCSO and the Common Policy Library (CPL)
Tripwire Enterprise App for Splunk Strengthens Cyberthreat Protection
Products and Releases  |  10/3/2014  | 
App offers actionable, real-time security for business critical assets
Fortscale Introduces User Behavior Analytics Solution That Enhances Security Teams User-Related Threat Mitigation
Products and Releases  |  10/3/2014  | 
Company announces general availability of user threats-centric, machine learning approach to enterprise security
Java Coding Guidelines: Now Available Free Online
Products and Releases  |  10/3/2014  | 
CERT Division of the Software Engineering Institute at Carnegie Mellon University identified best coding practices
ESET Launches Flagship NOD32 Antivirus 8 and Smart Security 8
Products and Releases  |  10/3/2014  | 
New Products Includes Botnet Protection Combined with Enhanced Exploit Blocker
Arxan Provides Secure Cryptography for Cloud-Based Mobile Wallets and Payments
Products and Releases  |  10/3/2014  | 
Security for mobile commerce.
CertainSafe Releases Enhancements to its MicroTokenized File Sharing Service
Products and Releases  |  10/3/2014  | 
New security and productivity features include time-based shredding, file-copying and file sharing enhancements
Adallom Announces Next Generation Cloud-Based Enterprise Information Governance
Products and Releases  |  10/3/2014  | 
Adallom joins forces with Salesforce.com to provide specialized enterprise information governance, compliance, and security as-a-service
Page 1 / 2   >   >>


Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-9541
PUBLISHED: 2018-11-14
In avrc_pars_vendor_rsp of avcr_pars_ct.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Androi...
CVE-2018-9542
PUBLISHED: 2018-11-14
In avrc_pars_vendor_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 ...
CVE-2018-9543
PUBLISHED: 2018-11-14
In f2fs_format_utils.c WITH_BLKDISCARD is not defined, which may cause the data partition to not be wiped at factory reset, leading to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. ...
CVE-2018-9544
PUBLISHED: 2018-11-14
In register_app of btif_hd.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: A...
CVE-2018-9545
PUBLISHED: 2018-11-14
In BTA_HdRegisterApp of bta_hd_api.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Androi...