Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2010
Page 1 / 2   >   >>
TippingPoint Introduces SSL Security Protection Customized For Data Centers Hosting Web Applications
Products and Releases  |  2/26/2010  | 
TippingPoint 1500S prevents encrypted attacks from compromising Web servers and Web applications
New Mobile VoIP Encryption Announced
Products and Releases  |  2/26/2010  | 
Smartphone Protector now complete with VoiceCrypto
Damballa Launches Realtime Botnet Termination
Products and Releases  |  2/26/2010  | 
Active Threat Termination identifies and stops malicious network activity without disrupting employee productivity or legitimate communications
TippingPoint Introduces New Products To Secure Virtualized Next-Generation Data Centers
Products and Releases  |  2/26/2010  | 
vController provides a data center security solution that addresses challenges of securing both virtual and physical infrastructure
Lumension Unveils Intelligent Application Whitelisting that Operationalizes A Proactive Endpoint Security Approach
Products and Releases  |  2/26/2010  | 
Lumension's Intelligent Whitelisting leverages both blacklisting and whitelisting approaches to deliver a more effective and operational endpoint security solution
Anonymous Browsing, Email Service Launched
Products and Releases  |  2/25/2010  | 
ConnectInPrivate.com offers a five-step suite for guaranteeing privacy online
New Single Sign-On From ActivIdentity
Products and Releases  |  2/25/2010  | 
Offering combines single sign-on password management with a strong authentication platform
FTC Issues Report Of 2009 Top Consumer Complaints
Products and Releases  |  2/24/2010  | 
Federal Trade Commission released a report listing top complaints consumers filed with the agency in 2009
Dasient Introduces Malware Protection Seal For Websites
Products and Releases  |  2/24/2010  | 
Dasient SafeSite seal is the world's first recognized security seal specifically for malware protection
Sophos Offered On Lenovo PCs
Products and Releases  |  2/24/2010  | 
Lenovo will offer Sophos security and data protection technology bundles with new Think-branded PCs
Arxan Launches Application Hardening For Mac Apps
Products and Releases  |  2/24/2010  | 
Extends GuardIT software protection solution to encompass applications targeted for the Mac OS X platform
Courion Upgrades ID And Access Management Solution
Products and Releases  |  2/24/2010  | 
Reduces risk and cost of compliance management by combining identity and access management, sensitive data management, and user activity monitoring
ActivIdentity And idOnDemand Partner For Cloud Security
Products and Releases  |  2/24/2010  | 
idOnDemand will integrate ActivIdentity's ActivID technology to provide a cloud-based system for issuing and managing smart cards
SecuWipe Deletes Data From Stolen Or Lost Windows Phones And Windows CE Terminals
Products and Releases  |  2/24/2010  | 
Latest version from Aiko Solutions offers full approach to protecting user identity and sensitive data in case of mobile phone theft or loss
Guardian Analytics Announces FraudMAP For Business Banking
Products and Releases  |  2/24/2010  | 
Company announces first solution to protect online business banking accounts and prevent fraud from login to logout
Key Pair Technologies Announces Cloud Security And Virtualization Product Family
Products and Releases  |  2/24/2010  | 
Three new solutions address need for increasingly tighter and more integrated security solutions
Centrify Delivers DirectSecure For Next-Generation Protection Of Cross-Platform Systems
Products and Releases  |  2/24/2010  | 
Centrify DirectSecure secures sensitive information by isolating and protecting cross-platform systems and by enabling end-to-end encryption of data in motion
HyTrust Announces $10.5 M In Series B Funding, Adds Cisco And Granite Ventures
Products and Releases  |  2/24/2010  | 
HyTrust will use the capital to drive development, sales, and marketing
Mocapay Unveils Secure Mobile Payments
Products and Releases  |  2/24/2010  | 
Newly patented technology creates single solution to conduct secure mobile transactions in a multichannel environment
3Com Delivers On Secure Network Fabric Strategy With New Solutions For Next-Generation Data Centers
Products and Releases  |  2/24/2010  | 
Four new solutions for large enterprises broadens the Secure Network Fabric in the virtualized data center
Qualys Launches Cloud Computing Solution For FDCC Compliance
Products and Releases  |  2/24/2010  | 
QualysGuard FDCC module helps federal agencies validate the configuration of their desktops according to FDCC regulations
Palo Alto Networks Rolls Out New Next-Generation Firewall Software
Products and Releases  |  2/23/2010  | 
PAN-OS 3.1 software enables finer-grained control over business and Web 2.0 applications for enterprises and distributed computing environments
TippingPoint Rolls Out New IPS For Virtual Environments
Products and Releases  |  2/23/2010  | 
vController provides a comprehensive data center security solution
Melissa Hathaway, John Stewart, Roland Cloutier Join Core's Advisory Board
Products and Releases  |  2/23/2010  | 
Trio will play a significant role in guiding Core's future mission and in achieving those goals
Agiliance Integrates With VeriSign iDefense
Products and Releases  |  2/23/2010  | 
Agiliance Threat and Vulnerability Manager's out-of-the-box integration with VeriSign iDefense Security Intelligence Services provides threat and vulnerability protection
BreakingPoint Announces Major Revenue Growth
Products and Releases  |  2/23/2010  | 
Patent-pending technology provides a scientific method of subjecting cyber-infrastructure elements to hostile and high-stress network conditions in order to measure their resiliency
Petition To Congress On E-Banking Security
Products and Releases  |  2/23/2010  | 
Authentify to ask security pros to get politically active to protect America's SMBs
Rapid7 Announces Exploit Index
Products and Releases  |  2/23/2010  | 
Adds Exploit Exposure to its vulnerability management product, NeXpose
Fasoo To Launch/Demo New Enterprise DRM Solution At RSA
Products and Releases  |  2/23/2010  | 
Fasoo Context-Sensitive DRM scans documents for sensitive information and automatically encrypts them with predefined security policies
Zscaler Publishes 'State of the Web' Report For Q4 2009
Products and Releases  |  2/23/2010  | 
Research details trends and security threats for corporate end users on the Web
Endace Introduces Next Generation, Carrier-Grade Intrusion Detection Solution
Products and Releases  |  2/23/2010  | 
Endace IDS combines multiple critical IT security systems into a single, fully integrated workflow
Rapid7 NeXpose Leverages Metasploit Data, Exploit Database
Products and Releases  |  2/23/2010  | 
Exploit Exposure provides users with deeper insight into the breach paths for vulnerabilities identified across multiple threat vectors
Alert Logic Launches LogReview For PCI
Products and Releases  |  2/22/2010  | 
Using Log Manager, Alert Logic security analysts review log data daily for suspicious activity or security concerns within customer network
Internet Tops 192 Million Domain Name Registrations
Products and Releases  |  2/22/2010  | 
Overall base of .com and .net domain names grew to 96.7 million domain names at the end of 2009
nCircle Announces Patch Priority Index
Products and Releases  |  2/22/2010  | 
Patch Priority Index rankings are based on nCircle's Risk Score
Utah High School Team Wins CyberPatriot II Competition
Products and Releases  |  2/22/2010  | 
Winning team narrowly defeated Team Curry, from Burlington, N.C.
FTC Probe Uncovers Widespread Data Breaches Via P2P Networks
Products and Releases  |  2/22/2010  | 
Close to 100 organizations have been notified that personal data has been shared
SHI And Solutionary Announce Partnership In Managed Security Services
Products and Releases  |  2/22/2010  | 
Solutionary to provide managed security services through SHI's Information Security and Risk Management Practice
Triumfant Issues RSA 2010 Malware Detection Challenge
Products and Releases  |  2/22/2010  | 
Company aims to show how its Resolution Manager solution can detect, analyze and remove all remnants of any malware infection
IBM, Thales Team In Key Management For Storage Encryption
Products and Releases  |  2/22/2010  | 
TEMS will be expanded to address the key management requirements of the IBM storage portfolio of products
IBM, Gemalto Team In Authentication
Products and Releases  |  2/19/2010  | 
Protiva security solution simplifies authentication for users
Trustwave Rolls Out DLP Application
Products and Releases  |  2/19/2010  | 
Scanning application evaluates content risk of identified targets
Comodo Rolls Out Dragon Browser Based On Chromium Project
Products and Releases  |  2/19/2010  | 
Comodo Dragon protects Internet users from inadvertently exposing information about themselves
Fidelis DLP Solution Takes Advantage Of Virtualization
Products and Releases  |  2/19/2010  | 
Rolls out Fidelis Extrusion Prevention System on VMware-based virtual appliances
41st Parameter Expands European Operations
Products and Releases  |  2/19/2010  | 
Also appoints information security veteran David Curran as vice president of its EMEA region
Avecto Releases Privilege Guard 2.5 And Extends Windows 7 UAC Capabilities
Products and Releases  |  2/19/2010  | 
In addition to tighter UAC integration, Privilege Guard 2.5 introduces many new features
CA Joins Cloud Security Alliance
Products and Releases  |  2/18/2010  | 
CA will support the Cloud Security Alliance's initiatives and working groups with identity and access management knowledge
OpenDNS Adds New Web Filtering Feature
Products and Releases  |  2/17/2010  | 
Block Page Bypass allows for individual or department-level filtering settings and bypass functionality
Teens Compete In CyberPatriot II Championships
Products and Releases  |  2/17/2010  | 
Friday's CyberPatriot II is the largest national high school cyber defense competition ever held
TriGeo Unveils its Next Generation SIEM
Products and Releases  |  2/17/2010  | 
TriGeo SIM Version 5.0 is designed specifically for midmarket organizations in financial services, healthcare, government, utility, retail and media/entertainment
Page 1 / 2   >   >>


SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Ericka Chickowski, Contributing Writer,  12/2/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19645
PUBLISHED: 2019-12-09
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
CVE-2019-19678
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the generic field entry point via the Generic Test Definition field of a new Generic Test issue.
CVE-2019-19679
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the Pre-Condition Summary entry point via the summary field of a Create Pre-Condition action for a new Test Issue.
CVE-2019-19647
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
CVE-2019-19648
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.