Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2010
Page 1 / 2   >   >>
TippingPoint Introduces SSL Security Protection Customized For Data Centers Hosting Web Applications
Products and Releases  |  2/26/2010  | 
TippingPoint 1500S prevents encrypted attacks from compromising Web servers and Web applications
New Mobile VoIP Encryption Announced
Products and Releases  |  2/26/2010  | 
Smartphone Protector now complete with VoiceCrypto
Damballa Launches Realtime Botnet Termination
Products and Releases  |  2/26/2010  | 
Active Threat Termination identifies and stops malicious network activity without disrupting employee productivity or legitimate communications
TippingPoint Introduces New Products To Secure Virtualized Next-Generation Data Centers
Products and Releases  |  2/26/2010  | 
vController provides a data center security solution that addresses challenges of securing both virtual and physical infrastructure
Lumension Unveils Intelligent Application Whitelisting that Operationalizes A Proactive Endpoint Security Approach
Products and Releases  |  2/26/2010  | 
Lumension's Intelligent Whitelisting leverages both blacklisting and whitelisting approaches to deliver a more effective and operational endpoint security solution
Anonymous Browsing, Email Service Launched
Products and Releases  |  2/25/2010  | 
ConnectInPrivate.com offers a five-step suite for guaranteeing privacy online
New Single Sign-On From ActivIdentity
Products and Releases  |  2/25/2010  | 
Offering combines single sign-on password management with a strong authentication platform
FTC Issues Report Of 2009 Top Consumer Complaints
Products and Releases  |  2/24/2010  | 
Federal Trade Commission released a report listing top complaints consumers filed with the agency in 2009
Dasient Introduces Malware Protection Seal For Websites
Products and Releases  |  2/24/2010  | 
Dasient SafeSite seal is the world's first recognized security seal specifically for malware protection
Sophos Offered On Lenovo PCs
Products and Releases  |  2/24/2010  | 
Lenovo will offer Sophos security and data protection technology bundles with new Think-branded PCs
Arxan Launches Application Hardening For Mac Apps
Products and Releases  |  2/24/2010  | 
Extends GuardIT software protection solution to encompass applications targeted for the Mac OS X platform
Courion Upgrades ID And Access Management Solution
Products and Releases  |  2/24/2010  | 
Reduces risk and cost of compliance management by combining identity and access management, sensitive data management, and user activity monitoring
ActivIdentity And idOnDemand Partner For Cloud Security
Products and Releases  |  2/24/2010  | 
idOnDemand will integrate ActivIdentity's ActivID technology to provide a cloud-based system for issuing and managing smart cards
SecuWipe Deletes Data From Stolen Or Lost Windows Phones And Windows CE Terminals
Products and Releases  |  2/24/2010  | 
Latest version from Aiko Solutions offers full approach to protecting user identity and sensitive data in case of mobile phone theft or loss
Guardian Analytics Announces FraudMAP For Business Banking
Products and Releases  |  2/24/2010  | 
Company announces first solution to protect online business banking accounts and prevent fraud from login to logout
Key Pair Technologies Announces Cloud Security And Virtualization Product Family
Products and Releases  |  2/24/2010  | 
Three new solutions address need for increasingly tighter and more integrated security solutions
Centrify Delivers DirectSecure For Next-Generation Protection Of Cross-Platform Systems
Products and Releases  |  2/24/2010  | 
Centrify DirectSecure secures sensitive information by isolating and protecting cross-platform systems and by enabling end-to-end encryption of data in motion
HyTrust Announces $10.5 M In Series B Funding, Adds Cisco And Granite Ventures
Products and Releases  |  2/24/2010  | 
HyTrust will use the capital to drive development, sales, and marketing
Mocapay Unveils Secure Mobile Payments
Products and Releases  |  2/24/2010  | 
Newly patented technology creates single solution to conduct secure mobile transactions in a multichannel environment
3Com Delivers On Secure Network Fabric Strategy With New Solutions For Next-Generation Data Centers
Products and Releases  |  2/24/2010  | 
Four new solutions for large enterprises broadens the Secure Network Fabric in the virtualized data center
Qualys Launches Cloud Computing Solution For FDCC Compliance
Products and Releases  |  2/24/2010  | 
QualysGuard FDCC module helps federal agencies validate the configuration of their desktops according to FDCC regulations
Palo Alto Networks Rolls Out New Next-Generation Firewall Software
Products and Releases  |  2/23/2010  | 
PAN-OS 3.1 software enables finer-grained control over business and Web 2.0 applications for enterprises and distributed computing environments
TippingPoint Rolls Out New IPS For Virtual Environments
Products and Releases  |  2/23/2010  | 
vController provides a comprehensive data center security solution
Melissa Hathaway, John Stewart, Roland Cloutier Join Core's Advisory Board
Products and Releases  |  2/23/2010  | 
Trio will play a significant role in guiding Core's future mission and in achieving those goals
Agiliance Integrates With VeriSign iDefense
Products and Releases  |  2/23/2010  | 
Agiliance Threat and Vulnerability Manager's out-of-the-box integration with VeriSign iDefense Security Intelligence Services provides threat and vulnerability protection
BreakingPoint Announces Major Revenue Growth
Products and Releases  |  2/23/2010  | 
Patent-pending technology provides a scientific method of subjecting cyber-infrastructure elements to hostile and high-stress network conditions in order to measure their resiliency
Petition To Congress On E-Banking Security
Products and Releases  |  2/23/2010  | 
Authentify to ask security pros to get politically active to protect America's SMBs
Rapid7 Announces Exploit Index
Products and Releases  |  2/23/2010  | 
Adds Exploit Exposure to its vulnerability management product, NeXpose
Fasoo To Launch/Demo New Enterprise DRM Solution At RSA
Products and Releases  |  2/23/2010  | 
Fasoo Context-Sensitive DRM scans documents for sensitive information and automatically encrypts them with predefined security policies
Zscaler Publishes 'State of the Web' Report For Q4 2009
Products and Releases  |  2/23/2010  | 
Research details trends and security threats for corporate end users on the Web
Endace Introduces Next Generation, Carrier-Grade Intrusion Detection Solution
Products and Releases  |  2/23/2010  | 
Endace IDS combines multiple critical IT security systems into a single, fully integrated workflow
Rapid7 NeXpose Leverages Metasploit Data, Exploit Database
Products and Releases  |  2/23/2010  | 
Exploit Exposure provides users with deeper insight into the breach paths for vulnerabilities identified across multiple threat vectors
Alert Logic Launches LogReview For PCI
Products and Releases  |  2/22/2010  | 
Using Log Manager, Alert Logic security analysts review log data daily for suspicious activity or security concerns within customer network
Internet Tops 192 Million Domain Name Registrations
Products and Releases  |  2/22/2010  | 
Overall base of .com and .net domain names grew to 96.7 million domain names at the end of 2009
nCircle Announces Patch Priority Index
Products and Releases  |  2/22/2010  | 
Patch Priority Index rankings are based on nCircle's Risk Score
Utah High School Team Wins CyberPatriot II Competition
Products and Releases  |  2/22/2010  | 
Winning team narrowly defeated Team Curry, from Burlington, N.C.
FTC Probe Uncovers Widespread Data Breaches Via P2P Networks
Products and Releases  |  2/22/2010  | 
Close to 100 organizations have been notified that personal data has been shared
SHI And Solutionary Announce Partnership In Managed Security Services
Products and Releases  |  2/22/2010  | 
Solutionary to provide managed security services through SHI's Information Security and Risk Management Practice
Triumfant Issues RSA 2010 Malware Detection Challenge
Products and Releases  |  2/22/2010  | 
Company aims to show how its Resolution Manager solution can detect, analyze and remove all remnants of any malware infection
IBM, Thales Team In Key Management For Storage Encryption
Products and Releases  |  2/22/2010  | 
TEMS will be expanded to address the key management requirements of the IBM storage portfolio of products
IBM, Gemalto Team In Authentication
Products and Releases  |  2/19/2010  | 
Protiva security solution simplifies authentication for users
Trustwave Rolls Out DLP Application
Products and Releases  |  2/19/2010  | 
Scanning application evaluates content risk of identified targets
Comodo Rolls Out Dragon Browser Based On Chromium Project
Products and Releases  |  2/19/2010  | 
Comodo Dragon protects Internet users from inadvertently exposing information about themselves
Fidelis DLP Solution Takes Advantage Of Virtualization
Products and Releases  |  2/19/2010  | 
Rolls out Fidelis Extrusion Prevention System on VMware-based virtual appliances
41st Parameter Expands European Operations
Products and Releases  |  2/19/2010  | 
Also appoints information security veteran David Curran as vice president of its EMEA region
Avecto Releases Privilege Guard 2.5 And Extends Windows 7 UAC Capabilities
Products and Releases  |  2/19/2010  | 
In addition to tighter UAC integration, Privilege Guard 2.5 introduces many new features
CA Joins Cloud Security Alliance
Products and Releases  |  2/18/2010  | 
CA will support the Cloud Security Alliance's initiatives and working groups with identity and access management knowledge
OpenDNS Adds New Web Filtering Feature
Products and Releases  |  2/17/2010  | 
Block Page Bypass allows for individual or department-level filtering settings and bypass functionality
Teens Compete In CyberPatriot II Championships
Products and Releases  |  2/17/2010  | 
Friday's CyberPatriot II is the largest national high school cyber defense competition ever held
TriGeo Unveils its Next Generation SIEM
Products and Releases  |  2/17/2010  | 
TriGeo SIM Version 5.0 is designed specifically for midmarket organizations in financial services, healthcare, government, utility, retail and media/entertainment
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file