Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in October 2014
Page 1 / 2   >   >>
Merchants Set Record Straight on Cybersecurity and Payments
Products and Releases  |  10/30/2014  | 
RILA, NACS, NRF, NGA, FMI and MAG send letter to Credit Unions
NEW: Home Depot breach cost credit unions nearly $60M
Products and Releases  |  10/30/2014  | 
Target breach cost credit unions nearly $30 million.
Cigital Acquiring Security Testing-as-a-Service Provider iViZ Security
Products and Releases  |  10/28/2014  | 
Cigital leverages iViZ to introduce 3D Unlimited Application Security Testing
Georgia Tech Releases 2015 Emerging Cyber Threats Report
Products and Releases  |  10/28/2014  | 
Keynote will be delivered by Dave Aitel, CEO of Immunity Inc., at GA Tech conference.
Identifying Jailbroken iPhones/rooted Android Phones To Stop Fraud
Products and Releases  |  10/28/2014  | 
Award-winning mobile SDK enhancements identify jailbroken and rooted devices, expose location and device/operating system mismatches
Tripwire Announces Adaptive Threat Protection
Products and Releases  |  10/28/2014  | 
Tripwire Enterprise and IP360 integration delivers integrated, automated view of cybersecurity risk
Tufin delivers end-to-end change automation for Check Point, Cisco and Juniper firewalls
Products and Releases  |  10/22/2014  | 
Version R14-3 of the Tufin Orchestration Suite Enables SDN-Equivalent Agility for Network Security Infrastructure
Illumio Brings Adaptive Security to Morgan Stanley, Plantronics, Creative Artists Agency, Yahoo and NTT I3
Products and Releases  |  10/22/2014  | 
Startup reinvents security for 100 million+ undersecured physical and virtual servers in private data centers and public clouds
Workers put off mobile business apps due to password complications and network security fears
Products and Releases  |  10/22/2014  | 
Wide-scale survey shows almost a third of workers are put off accessing business-critical apps and reveals employees are frustrated by long, complex passwords
New Option for Enterprise to Cloud
Products and Releases  |  10/22/2014  | 
Radical new technology is backed by corporations, including GE and Qualcomm, as well as leading venture firms Andreessen Horowitz, Norwest Venture Partners, Sutter Hill Ventures and ARTIS Ventures
Application Data Control to secure IT/OT communications
Products and Releases  |  10/22/2014  | 
Stronger-than-firewall technology delivers on what industrial and next-gen firewalls promise
ISA Supports Treasury Initiative on Cybersecurity Incentives
Products and Releases  |  10/21/2014  | 
The Committee will meet for the first time next month to discuss cybersecurity insurance.
Zscaler Expands Partner Ecosystem
Products and Releases  |  10/21/2014  | 
Zscalers Security as a Service Platform Integrates with Complementary Solutions to Help Enterprises Maximize their Security Investment
White Ops Names Former RSA CISO as President and Chief Operating Officer
Products and Releases  |  10/20/2014  | 
Eddie Schwartz Brings More Than 25 Years of Expertise, From Building Companies to Managing Global Security Needs of Fortune 100 and Government Organizations
Netwrix Helps Detect Insider Threats and Prevent Security Breaches with Launch of Netwrix Auditor 6.5
Products and Releases  |  10/20/2014  | 
Leading Change and Configuration Auditing Platform Provides Complete Visibility and Ensures that Sensitive Data Is under Permanent Control
Vorstack Accelerates Adoption of Threat Intelligence Strategies with 5.0 Launch
Products and Releases  |  10/20/2014  | 
ISAC Members can shorten Time to Discovery with Vorstack Automation and Collaboration Platform
Telco Systems Unveils First Two TelcoApps to Deliver Virtualized Firewall and Routing Network Functions for Telecom Networks
Products and Releases  |  10/20/2014  | 
New apps run over CloudMetro platforms virtualized engine, simplifying VNF execution and management
Staying Ahead of DDoS Attacks
Products and Releases  |  10/20/2014  | 
NSFOCUS Unveils Robust Anti-DDoS Solution for Hosting Service Providers, Data Centers and MSSPs
Visa launching major chip education effort
Products and Releases  |  10/17/2014  | 
Visa study finds more than half of consumers and two-thirds of merchants are aware of chip technology; one-third of consumers who are aware of chips security benefits cite preference for shopping at chip merchants; four-in-five merchants say chip readers would benefit their businesses
VM-Series Brings Next-Gen Security to Cloud
Products and Releases  |  10/16/2014  | 
Protects Private, Hybrid and Now Public Cloud-Computing Environments from Todays Advanced Cyber Threats
Alert Logic Introduces ActiveWatch For Alert Logic Log Manager
Products and Releases  |  10/15/2014  | 
New managed service debuts.
Risk I/O Appoints Security Veteran Karim Toubba as CEO
Products and Releases  |  10/14/2014  | 
Company also announces additional Series A funding.
Duo Security Introduces API Edition of Its Two-Factor Authentication Service
Products and Releases  |  10/14/2014  | 
Enables Developers to Quickly Add Strong Authentication to Web and Mobile Apps
Novetta Leads Malware Interdiction w Partners Microsoft, FireEye, Cisco, & More!
Products and Releases  |  10/14/2014  | 
Coalition Seeks to Move Beyond Singular Threat Reporting toward Large-scale Proactive and Cooperative Interdiction Efforts Against Threat Groups
Luxembourg Firm Unveils Solutions Restoring Internet Communications Privacy
Products and Releases  |  10/13/2014  | 
pEp Security SA bundle fully removes Internet surveillance for individual and corporate users, seamlessly within existing communications programs and tools.
Ping Identity partners with Sprint to offer single sign-on for Google Apps
Products and Releases  |  10/13/2014  | 
Mobile Collaboration Just Got Easier with Sprint and Google Apps for Work
CipherCloud announces advancement on world's leading enterprise apps marketplace
Products and Releases  |  10/13/2014  | 
Customers can now quickly access and apply industry-specific solutions to meet data privacy and compliance needs
Symantec Announces New Strategy to Fuel Growth and Plans to Separate into Two Public Industry-Leading Technology Companies
Products and Releases  |  10/10/2014  | 
Bank of America is Best Overall, While Union Bank and Ally Bank Rank in Top Awards Too
Impervas Fifth Annual Web Application Attack Report Reveals That Malicious Traffic and Web Attacks Have Significantly Increased
Products and Releases  |  10/10/2014  | 
Retail Applications, Websites Containing Consumer Information and WordPress are Todays Biggest Attack Targets
Alleged Russian Cyber-Criminal Now Charged in 40-Count Superseding Indictment
Products and Releases  |  10/10/2014  | 
New counts emerge.
Onapsis Research Labs details seven new critical security advisories for businesses using SAP HANA and SAP BusinessObjects
Products and Releases  |  10/10/2014  | 
New threats identified by international team of security experts includes high risk vulnerability in SAP HANA database
AlgoSec First to Unify Security Policy Management Across In Hybrid Cloud Environments
Products and Releases  |  10/10/2014  | 
Support for Amazon Web Services Delivers Comprehensive Visibility, Auditing and Streamlined Policy Management
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response
Products and Releases  |  10/10/2014  | 
Technology uses existing log repository data to track user behavior, detect and qualify threats not recognized by SIEM
Spam Email Disrupts Two-Thirds of Businesses Each Year
Products and Releases  |  10/10/2014  | 
ndependent research commissioned by GFI Software shows negative impact on US businesses from malware attacks, phishing scams and data thefts
Javelin Research Unveils Identity Safety in Banking Scorecard
Products and Releases  |  10/10/2014  | 
Bank of America is Best Overall, While Union Bank and Ally Bank Rank in Top Awards Too
Arbor Networks ATLAS Data Shows Reflection DDoS Attacks Continue to be Significant in Q3 2014
Products and Releases  |  10/9/2014  | 
133 attacks over 100Gbps so far in 2014; 22 recorded in Q3
Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response
Products and Releases  |  10/6/2014  | 
Technology uses existing log repository data to track user behavior, detect and qualify threats not recognized by SIEM
TraceSecurity Announces Integration Partnership with Information Shield
Products and Releases  |  10/3/2014  | 
Relationship Delivers Seamless Integration between TraceCSO and the Common Policy Library (CPL)
Tripwire Enterprise App for Splunk Strengthens Cyberthreat Protection
Products and Releases  |  10/3/2014  | 
App offers actionable, real-time security for business critical assets
Fortscale Introduces User Behavior Analytics Solution That Enhances Security Teams User-Related Threat Mitigation
Products and Releases  |  10/3/2014  | 
Company announces general availability of user threats-centric, machine learning approach to enterprise security
Java Coding Guidelines: Now Available Free Online
Products and Releases  |  10/3/2014  | 
CERT Division of the Software Engineering Institute at Carnegie Mellon University identified best coding practices
ESET Launches Flagship NOD32 Antivirus 8 and Smart Security 8
Products and Releases  |  10/3/2014  | 
New Products Includes Botnet Protection Combined with Enhanced Exploit Blocker
Arxan Provides Secure Cryptography for Cloud-Based Mobile Wallets and Payments
Products and Releases  |  10/3/2014  | 
Security for mobile commerce.
CertainSafe Releases Enhancements to its MicroTokenized File Sharing Service
Products and Releases  |  10/3/2014  | 
New security and productivity features include time-based shredding, file-copying and file sharing enhancements
Adallom Announces Next Generation Cloud-Based Enterprise Information Governance
Products and Releases  |  10/3/2014  | 
Adallom joins forces with Salesforce.com to provide specialized enterprise information governance, compliance, and security as-a-service
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...