Products and Releases

Content posted in November 2012
Page 1 / 2   >   >>
Ukraine Approves Biometric IDs
Products and Releases  |  11/30/2012  | 
IDs will comply with the standards recommended by the International Civil Aviation Organization
Advanced Data Processing Inc. Discloses Ambulance Data Billing System Breach
Products and Releases  |  11/30/2012  | 
Investigation revealed unauthorized access and, in certain instances, disclosure of personal information
Agiliance Now Offers More Than 50 Data Connectors To Enable Real-Time Security Risk Intelligence And Remediation
Products and Releases  |  11/29/2012  | 
Agiliance also introduced a new connector type called "Big Data"
Voltage Security Leverages Persistent Systems To Deliver Solution Upgrades And Security Alerts
Products and Releases  |  11/29/2012  | 
Voltage is now able to deliver solution upgrades within 18 hours
Trend Micro Cloud Security Solutions Optimized For Amazon Web Services
Products and Releases  |  11/29/2012  | 
Customers can leverage AWS Storage Gateway
TrainACE Releases White Paper That Examines Notable Differences In CASP vs. CISSP Certifications
Products and Releases  |  11/29/2012  | 
First publicized white paper explores two security certifications
IBM And ForeScout Team on Network Security Intelligence And Automated Threat Response
Products and Releases  |  11/29/2012  | 
Partnership will allow joint customers to improve real-time visibility, security intelligence, and automated control
CellTrust Announces HIPAA-Compliant Communication Integration Server
Products and Releases  |  11/29/2012  | 
Server is available as a hosted cloud solution or as an enterprise solution
GlobalSign Adds StopTheHacker Malware Monitoring Services To SSL Certificates
Products and Releases  |  11/29/2012  | 
Partnership will provide advanced malware detection for GlobalSign’s SSL Certificate customers
NSS Labs Reveals Browsers' Anti-Phishing Progress And Phishers' New Tactics
Products and Releases  |  11/29/2012  | 
Examined four leading browsers -- Apple Safari, Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox
Study Finds Unencrypted Payment Data On Business Networks Remains At 70%
Products and Releases  |  11/28/2012  | 
SecurityMetrics PANscan finds financial, hospitality, retail industries store most info
Entrust Solves 3 Major SSL Compliance Challenges With Certificate Discovery Service
Products and Releases  |  11/28/2012  | 
Entrust Discovery includes automatic certificate chain validation email alerts
Public Interest Registry Survey Reveals That Most Americans Are Uninformed About DDoS Attacks
Products and Releases  |  11/28/2012  | 
Across the board there is a lack of understanding about DDoS attacks
Foreground Security Offers Customers A Virtual Security Operations Center (V-SOC)
Products and Releases  |  11/27/2012  | 
Solutions designed to assist government and commercial organizations anticipate, detect and respond to advanced threats and vulnerabilities
'Bring Your Own Network' Policy Tackles Rising Network Costs And Security In The Enterprise, iPass White Paper
Products and Releases  |  11/27/2012  | 
Whitepaper outlines how CIOs and IT departments can boost mobile working practices effectively and tackle the rising security risks and costs of BYOD and BYON policies
Trend Micro New Free Online Assessment Tools For Cloud, Cyber & Mobile Security
Products and Releases  |  11/27/2012  | 
Results are provided in five areas of security: protection, responsiveness, organization, expertise and visibility
Cooperation Is Key For Europe's Cybersecurity
Products and Releases  |  11/27/2012  | 
ENISA meeting brought together key figures from the European Parliament, European Commission, and the computer industry
LabTech And Symantec Complete Integration Of Backup and Endpoint Security Solutions For IT Service Providers
Products and Releases  |  11/26/2012  | 
MSPs can use LabTech's RMM tools to deploy, set up, manage, and monitor backup and endpoint security across multiple domains
Panorama9 Launches Patch Management For Mac
Products and Releases  |  11/26/2012  | 
Tool automates tedious patch management activities
Black Hat Abu Dhabi Unveils 2012 Program in Cooperation With TRA & Khalifa University Of Science And Technology
Products and Releases  |  11/26/2012  | 
Jeff Moss, VP and Information Security officer at ICANN, will keynote
New Visa Consumer Authentication Service Combats eCommerce Fraud
Products and Releases  |  11/26/2012  | 
Solution designed to seamlessly support an issuer's Three Domain Secure (3-D Secure) program
Kudelski Group Launches Kudelski Security
Products and Releases  |  11/21/2012  | 
Offering consists of a set of services initially focusing on assisting companies to assess risk and vulnerabilities
IDaaS Provider Announces 1 Million Identities Under Management
Products and Releases  |  11/21/2012  | 
According to Gartner, IDaaS will account for 25% of all new IAM sales by the end of 2014
RSA Targets Advanced Threats and 'Account Takeover' Attacks With New RSA Adaptive Authentication Solution
Products and Releases  |  11/20/2012  | 
Solution uses a Big Data approach to help combat threats posed by more than 30 million variants of malware
Consumer Awareness, SSL Digital Certificates Offer Protection Against Holiday Online Scams, Says Security Expert
Products and Releases  |  11/19/2012  | 
Entrust provides five tips to ensure consumers have a safe online shopping season
Panda Security Launches New Panda GateDefender Performa eSeries
Products and Releases  |  11/19/2012  | 
eSeries is a new line of integrated perimeter security appliances designed for midsize and large companies
Cisco Announces Intent To Acquire Meraki
Products and Releases  |  11/19/2012  | 
Meraki offers midmarket customers on-premise networking solutions that can be centrally managed from the cloud
PCI Council Issues New Guidance On Risk Assessment
Products and Releases  |  11/16/2012  | 
PCI DSS Risk Assessment Guidelines Information Supplement can help identify threats and associated vulnerabilities that could jeopardize security of payment card data
GlobalSign SSL Configuration Checker Provides Guidance To Reduce Cybercriminals' Ability To Exploit Faulty SSL Configurations
Products and Releases  |  11/15/2012  | 
Free online service allows website administrators to confirm that they have correctly configured SSL
Symantec's Digital Information Index Reveals Half Of Business Information Resides Outside The Firewall
Products and Releases  |  11/15/2012  | 
Cloud and mobile computing driving information sprawl
Georgia Tech Releases Cyber Threats Forecast for 2013
Products and Releases  |  11/15/2012  | 
Specific threats include cloud-based botnets
ForgeRock Launches Open Identity Stack To Protect Enterprise, Cloud, Social, And Mobile Applications
Products and Releases  |  11/15/2012  | 
Open Identity Stack provides an all-in-one platform to deploy identity management
CounterTack Names New Chief Researcher
Products and Releases  |  11/15/2012  | 
Sean Bodmer has more than 16 years of security assurance experience
Faronics Survey Reveals BYOD, Unstructured Data, Check And Credit Card Fraud As Most Critical Threats To Businesses
Products and Releases  |  11/15/2012  | 
Study reveals that businesses don’t fully grasp the repercussions resulting from one or more data breaches
Radware Introduces Attack Mitigation Solution, DefensePro x420
Products and Releases  |  11/15/2012  | 
DefensePro x420 can handle 25 million packets per second of attack traffic
Vint Cerf Named Chair Of StopBadware Board Of Directors
Products and Releases  |  11/15/2012  | 
Esther Dyson will take on the office of clerk
Forrester Survey: Wary Enterprises Still Place Sensitive Data In The Cloud
Products and Releases  |  11/14/2012  | 
User provisioning and SSO/Web access management the two leading access-control priorities for enterprises
GFI Launches VIPRE 6.0 For Business
Products and Releases  |  11/14/2012  | 
Integrated antivirus, patch management, and Mobile Device Management on a single console
Sophos Intros New UTM Exclusively For SMBs
Products and Releases  |  11/14/2012  | 
Sophos UTM 100 with BasicGuard provides network, email, Web, and wireless protection
New Symantec Protection Center Mobile, Security Dashboard For iPad
Products and Releases  |  11/14/2012  | 
Symantec Protection Center Mobile leverages Symantec Protection Center Enterprise platform
Vigilant Announces Threat Intelligence Portal
Products and Releases  |  11/14/2012  | 
CTI Portal allows for faster investigation of potential threats
Palo Alto Networks Rolls Out Virtualized, Other Firewalls
Products and Releases  |  11/14/2012  | 
New products are supported by the release of PAN-OS 5.0
Panda Security Updates Cloud Partner Center
Products and Releases  |  11/14/2012  | 
Latest version of the partner console allows management of Panda Security's entire cloud portfolio
FTC Commissioner Chats With Industry Leaders
Products and Releases  |  11/14/2012  | 
"Privacy is being incorporated at the most fundamental levels," said Julie Brill at Annual PMA Marketing Law Conference
Employee-Empowering Technologies Raise Security Stakes For Organizations, New CompTIA Study Reveals
Products and Releases  |  11/14/2012  | 
Majority of companies attribute human error as a contributing cause of security breaches
65% Of Organizations Experience Three DDoS Attacks A Year
Products and Releases  |  11/13/2012  | 
New report from Radware and the Ponemon Institute reveals DoS and DDoS attacks now rank as two of the top three threats organizations face
HiSoftware Releases Next Generation Of Solutions For NewsGator Social Compliance Monitoring
Products and Releases  |  11/13/2012  | 
Solution helps organizations better detect, document, and prevent privacy breaches and exposure of confidential information in their social environments
Head Of HP Enterprise Security Takes Over As Vormetric CEO
Products and Releases  |  11/13/2012  | 
Alan Kessler has more than 20 years of management experience
SAP To Deliver Enhanced Enterprise Security, Apps And App Platform For Windows 8
Products and Releases  |  11/13/2012  | 
SAP plans to offer six business apps for Windows 8 for use on devices of various form factors
Two Thirds Of Brits Back Pre-Emptive Cyber Strikes On Enemy States, Reveals Logrhythm Research
Products and Releases  |  11/13/2012  | 
Growing cybertension between nations fuels public desire for intensified government action
Page 1 / 2   >   >>

High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.
PUBLISHED: 2019-02-21
Seafile through 6.2.11 always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
PUBLISHED: 2019-02-21
An issue was discovered in Liquidware ProfileUnity before 6.8.0 with Liquidware FlexApp before 6.8.0. A local user could obtain administrator rights, as demonstrated by use of PowerShell.
PUBLISHED: 2019-02-21
Splunk Web in Splunk Enterprise 6.5.x before 6.5.5, 6.4.x before 6.4.9, 6.3.x before 6.3.12, 6.2.x before 6.2.14, 6.1.x before 6.1.14, and 6.0.x before 6.0.15 and Splunk Light before 6.6.0 has Persistent XSS, aka SPL-138827.