Products and Releases

Content posted in November 2012
Page 1 / 2   >   >>
Ukraine Approves Biometric IDs
Products and Releases  |  11/30/2012  | 
IDs will comply with the standards recommended by the International Civil Aviation Organization
Advanced Data Processing Inc. Discloses Ambulance Data Billing System Breach
Products and Releases  |  11/30/2012  | 
Investigation revealed unauthorized access and, in certain instances, disclosure of personal information
Agiliance Now Offers More Than 50 Data Connectors To Enable Real-Time Security Risk Intelligence And Remediation
Products and Releases  |  11/29/2012  | 
Agiliance also introduced a new connector type called "Big Data"
Voltage Security Leverages Persistent Systems To Deliver Solution Upgrades And Security Alerts
Products and Releases  |  11/29/2012  | 
Voltage is now able to deliver solution upgrades within 18 hours
Trend Micro Cloud Security Solutions Optimized For Amazon Web Services
Products and Releases  |  11/29/2012  | 
Customers can leverage AWS Storage Gateway
TrainACE Releases White Paper That Examines Notable Differences In CASP vs. CISSP Certifications
Products and Releases  |  11/29/2012  | 
First publicized white paper explores two security certifications
IBM And ForeScout Team on Network Security Intelligence And Automated Threat Response
Products and Releases  |  11/29/2012  | 
Partnership will allow joint customers to improve real-time visibility, security intelligence, and automated control
CellTrust Announces HIPAA-Compliant Communication Integration Server
Products and Releases  |  11/29/2012  | 
Server is available as a hosted cloud solution or as an enterprise solution
GlobalSign Adds StopTheHacker Malware Monitoring Services To SSL Certificates
Products and Releases  |  11/29/2012  | 
Partnership will provide advanced malware detection for GlobalSign’s SSL Certificate customers
NSS Labs Reveals Browsers' Anti-Phishing Progress And Phishers' New Tactics
Products and Releases  |  11/29/2012  | 
Examined four leading browsers -- Apple Safari, Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox
Study Finds Unencrypted Payment Data On Business Networks Remains At 70%
Products and Releases  |  11/28/2012  | 
SecurityMetrics PANscan finds financial, hospitality, retail industries store most info
Entrust Solves 3 Major SSL Compliance Challenges With Certificate Discovery Service
Products and Releases  |  11/28/2012  | 
Entrust Discovery includes automatic certificate chain validation email alerts
Public Interest Registry Survey Reveals That Most Americans Are Uninformed About DDoS Attacks
Products and Releases  |  11/28/2012  | 
Across the board there is a lack of understanding about DDoS attacks
Foreground Security Offers Customers A Virtual Security Operations Center (V-SOC)
Products and Releases  |  11/27/2012  | 
Solutions designed to assist government and commercial organizations anticipate, detect and respond to advanced threats and vulnerabilities
'Bring Your Own Network' Policy Tackles Rising Network Costs And Security In The Enterprise, iPass White Paper
Products and Releases  |  11/27/2012  | 
Whitepaper outlines how CIOs and IT departments can boost mobile working practices effectively and tackle the rising security risks and costs of BYOD and BYON policies
Trend Micro New Free Online Assessment Tools For Cloud, Cyber & Mobile Security
Products and Releases  |  11/27/2012  | 
Results are provided in five areas of security: protection, responsiveness, organization, expertise and visibility
Cooperation Is Key For Europe's Cybersecurity
Products and Releases  |  11/27/2012  | 
ENISA meeting brought together key figures from the European Parliament, European Commission, and the computer industry
LabTech And Symantec Complete Integration Of Backup and Endpoint Security Solutions For IT Service Providers
Products and Releases  |  11/26/2012  | 
MSPs can use LabTech's RMM tools to deploy, set up, manage, and monitor backup and endpoint security across multiple domains
Panorama9 Launches Patch Management For Mac
Products and Releases  |  11/26/2012  | 
Tool automates tedious patch management activities
Black Hat Abu Dhabi Unveils 2012 Program in Cooperation With TRA & Khalifa University Of Science And Technology
Products and Releases  |  11/26/2012  | 
Jeff Moss, VP and Information Security officer at ICANN, will keynote
New Visa Consumer Authentication Service Combats eCommerce Fraud
Products and Releases  |  11/26/2012  | 
Solution designed to seamlessly support an issuer's Three Domain Secure (3-D Secure) program
Kudelski Group Launches Kudelski Security
Products and Releases  |  11/21/2012  | 
Offering consists of a set of services initially focusing on assisting companies to assess risk and vulnerabilities
IDaaS Provider Announces 1 Million Identities Under Management
Products and Releases  |  11/21/2012  | 
According to Gartner, IDaaS will account for 25% of all new IAM sales by the end of 2014
RSA Targets Advanced Threats and 'Account Takeover' Attacks With New RSA Adaptive Authentication Solution
Products and Releases  |  11/20/2012  | 
Solution uses a Big Data approach to help combat threats posed by more than 30 million variants of malware
Consumer Awareness, SSL Digital Certificates Offer Protection Against Holiday Online Scams, Says Security Expert
Products and Releases  |  11/19/2012  | 
Entrust provides five tips to ensure consumers have a safe online shopping season
Panda Security Launches New Panda GateDefender Performa eSeries
Products and Releases  |  11/19/2012  | 
eSeries is a new line of integrated perimeter security appliances designed for midsize and large companies
Cisco Announces Intent To Acquire Meraki
Products and Releases  |  11/19/2012  | 
Meraki offers midmarket customers on-premise networking solutions that can be centrally managed from the cloud
PCI Council Issues New Guidance On Risk Assessment
Products and Releases  |  11/16/2012  | 
PCI DSS Risk Assessment Guidelines Information Supplement can help identify threats and associated vulnerabilities that could jeopardize security of payment card data
GlobalSign SSL Configuration Checker Provides Guidance To Reduce Cybercriminals' Ability To Exploit Faulty SSL Configurations
Products and Releases  |  11/15/2012  | 
Free online service allows website administrators to confirm that they have correctly configured SSL
Symantec's Digital Information Index Reveals Half Of Business Information Resides Outside The Firewall
Products and Releases  |  11/15/2012  | 
Cloud and mobile computing driving information sprawl
Georgia Tech Releases Cyber Threats Forecast for 2013
Products and Releases  |  11/15/2012  | 
Specific threats include cloud-based botnets
ForgeRock Launches Open Identity Stack To Protect Enterprise, Cloud, Social, And Mobile Applications
Products and Releases  |  11/15/2012  | 
Open Identity Stack provides an all-in-one platform to deploy identity management
CounterTack Names New Chief Researcher
Products and Releases  |  11/15/2012  | 
Sean Bodmer has more than 16 years of security assurance experience
Faronics Survey Reveals BYOD, Unstructured Data, Check And Credit Card Fraud As Most Critical Threats To Businesses
Products and Releases  |  11/15/2012  | 
Study reveals that businesses don’t fully grasp the repercussions resulting from one or more data breaches
Radware Introduces Attack Mitigation Solution, DefensePro x420
Products and Releases  |  11/15/2012  | 
DefensePro x420 can handle 25 million packets per second of attack traffic
Vint Cerf Named Chair Of StopBadware Board Of Directors
Products and Releases  |  11/15/2012  | 
Esther Dyson will take on the office of clerk
Forrester Survey: Wary Enterprises Still Place Sensitive Data In The Cloud
Products and Releases  |  11/14/2012  | 
User provisioning and SSO/Web access management the two leading access-control priorities for enterprises
GFI Launches VIPRE 6.0 For Business
Products and Releases  |  11/14/2012  | 
Integrated antivirus, patch management, and Mobile Device Management on a single console
Sophos Intros New UTM Exclusively For SMBs
Products and Releases  |  11/14/2012  | 
Sophos UTM 100 with BasicGuard provides network, email, Web, and wireless protection
New Symantec Protection Center Mobile, Security Dashboard For iPad
Products and Releases  |  11/14/2012  | 
Symantec Protection Center Mobile leverages Symantec Protection Center Enterprise platform
Vigilant Announces Threat Intelligence Portal
Products and Releases  |  11/14/2012  | 
CTI Portal allows for faster investigation of potential threats
Palo Alto Networks Rolls Out Virtualized, Other Firewalls
Products and Releases  |  11/14/2012  | 
New products are supported by the release of PAN-OS 5.0
Panda Security Updates Cloud Partner Center
Products and Releases  |  11/14/2012  | 
Latest version of the partner console allows management of Panda Security's entire cloud portfolio
FTC Commissioner Chats With Industry Leaders
Products and Releases  |  11/14/2012  | 
"Privacy is being incorporated at the most fundamental levels," said Julie Brill at Annual PMA Marketing Law Conference
Employee-Empowering Technologies Raise Security Stakes For Organizations, New CompTIA Study Reveals
Products and Releases  |  11/14/2012  | 
Majority of companies attribute human error as a contributing cause of security breaches
65% Of Organizations Experience Three DDoS Attacks A Year
Products and Releases  |  11/13/2012  | 
New report from Radware and the Ponemon Institute reveals DoS and DDoS attacks now rank as two of the top three threats organizations face
HiSoftware Releases Next Generation Of Solutions For NewsGator Social Compliance Monitoring
Products and Releases  |  11/13/2012  | 
Solution helps organizations better detect, document, and prevent privacy breaches and exposure of confidential information in their social environments
Head Of HP Enterprise Security Takes Over As Vormetric CEO
Products and Releases  |  11/13/2012  | 
Alan Kessler has more than 20 years of management experience
SAP To Deliver Enhanced Enterprise Security, Apps And App Platform For Windows 8
Products and Releases  |  11/13/2012  | 
SAP plans to offer six business apps for Windows 8 for use on devices of various form factors
Two Thirds Of Brits Back Pre-Emptive Cyber Strikes On Enemy States, Reveals Logrhythm Research
Products and Releases  |  11/13/2012  | 
Growing cybertension between nations fuels public desire for intensified government action
Page 1 / 2   >   >>

13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
From DevOps to DevSecOps: Structuring Communication for Better Security
Robert Hawk, Privacy & Security Lead at xMatters,  2/15/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.