Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2010
<<   <   Page 2 / 2
Free Online Service Helps Software Developers Gauge Payment Application Security Vulnerabilities
Products and Releases  |  2/17/2010  | 
Online tool at www.freePCIscore.com generates a Payment Application Risk Score
Rapid 7 Rolls Out Service For Compliance With New Mass. Privacy Law
Products and Releases  |  2/17/2010  | 
NeXpose can be used as a standalone solution or in conjunction with the new Rapid7 Massachusetts Privacy Law Audit Service
Centrify Rolls Out New ID/Access Management Line
Products and Releases  |  2/17/2010  | 
Additions to Centrify Suite provide additional layers of security and compliance while extending IT operational efficiencies
Cloudmark Acquires Bizanga
Products and Releases  |  2/17/2010  | 
Acquisition will benefit operators by delivering a unified solution that increases the performance, reliability and security of their messaging infrastructure
Former DHS Assistant Cybersecurity Secretary Joins Information Security Forum
Products and Releases  |  2/16/2010  | 
Greg Garcia named strategic adviser for North America
McAfee, Brocade Team Up In Network Security
Products and Releases  |  2/16/2010  | 
Brocade will work in conjunction with McAfee to integrate critical security capabilities into the Brocade family of networking products
SonicWALL Reports Fourth Quarter And Fiscal Year 2009 Financial Results
Products and Releases  |  2/12/2010  | 
SonicWALL expects first quarter 2010 revenue to be in the range of $52 million to $54 million
Deluxe Unveils Comprehensive Suite of Identity Theft Protection Solutions For Financial Institutions
Products and Releases  |  2/12/2010  | 
Deluxe Provent includes a range of services to enhance and build account-holder relationships
Justice Department Announces New Intellectual Property Task Force As Part Of Broad IP Enforcement Initiative
Products and Releases  |  2/12/2010  | 
Task Force will focus on strengthening efforts to combat intellectual property crimes through close coordination with state and local law enforcement partners
Cybercriminals Continue To Show Their Love For Valentine's Day
Products and Releases  |  2/12/2010  | 
PandaLabs provides tips for Internet users to protect their PCs from holiday-themed malware
Conformity Partners With VeriSign
Products and Releases  |  2/11/2010  | 
VeriSign Identity Protection to provide strong authentication for conformity
Endace Offers Free IDS/IPS Health Checks
Products and Releases  |  2/10/2010  | 
Capture Replay Challenge helps organizations pinpoint the IT security vulnerabilities being missed by current systems
Veracode Secures $12 Million In VC Funding
Products and Releases  |  2/10/2010  | 
StarVest joins current investors, Atlas Venture and .406 Ventures, in the expansion funding
Websense Unveils TRITON Architecture Unifying Web, Data, Email Security
Products and Releases  |  2/10/2010  | 
Websense TRITON architecture integrates the real-time Web content analysis and malware protection
Botnet 'Weather Report' Shows Power Of Botnets
Products and Releases  |  2/10/2010  | 
The Weather Report 2009 explains how botnets are identified and tracked and examines their technical architecture
Security Firm Makes Final Preparations For The Vancouver 2010 Olympic Winter Games
Products and Releases  |  2/10/2010  | 
With the Games just a few days away, CSC is ready with its 5,000 member highly-trained workforce
nCircle Announces 8th Consecutive Year Of Revenue Growth And Continued Profitability
Products and Releases  |  2/10/2010  | 
Announces 22% year-over-year revenue growth for the year ending Dec. 31, 2009
Trustwave NAC Achieves Common Criteria Validation
Products and Releases  |  2/10/2010  | 
Trustwave has been validated for Common Criteria Evaluation Assurance Level (EAL) 2 Augmented with Flaw Remediation (ALC FLR. 1) or EAL 2+
Titus Labs Launches Version 2 Of Metadata Security For The Microsoft SharePoint Platform
Products and Releases  |  2/10/2010  | 
App provides enhanced options for administrators to protect information in SharePoint based on metadata properties
Astaro Rolls Out Free Firewall
Products and Releases  |  2/10/2010  | 
New licensing model lowers entry prices for unified threat management
Cellcrypt Offers Free 90-Day Secure Calling Trial For BlackBerry Smartphone Users
Products and Releases  |  2/9/2010  | 
Company launches Wi-Fi version of its secure mobile voice calling application
McAfee Upgrades Consumer Security Product Line
Products and Releases  |  2/9/2010  | 
Enhances Web protection to alert and block consumers from dangerous downloads and Web pages before they access them
BigFix Offers 10% Discount In The Spirit Of IT Dinosaur Awards
Products and Releases  |  2/9/2010  | 
Upgrade program offers enterprise IT organizations 10 percent off the quoted renewal cost of incumbent security and systems management software solutions
Verizon Business Helps Medium-Sized Businesses Combat Cyberthreats With New, Affordable Integrated Security Suite
Products and Releases  |  2/9/2010  | 
Service offers five-way protection against cyberthreats in a cost-effective pay-per-use model
Trend Micro Expands its Hosted Security Service And Puts Focus On Channel-Success And Protecting Mobile Workers
Products and Releases  |  2/8/2010  | 
Introduces channel-friendly Worry-Free Business Security Services for small businesses
Smart Card Alliance Healthcare Council Plans Identity Management Focus For Upcoming Year
Products and Releases  |  2/8/2010  | 
Alliance announces newly elected officers
CA Extends Web Access Security Technology
Products and Releases  |  2/8/2010  | 
CA SiteMinder and CA SOA Security Manager help JBoss customers with security needs including authentication, authorization, and auditing
SPYRUS Ships Secure Storage Devices With FIPS 140-2 Encryption
Products and Releases  |  2/8/2010  | 
NIST publication approves the XTS-AES mode of operation as an option for protecting the confidentiality of data on storage devices
ENISA: 17 Golden Rules To Combat Online Risks For Mobile Social Networking
Products and Releases  |  2/8/2010  | 
New report points out the risks and threats of mobile social networking services
Security Startup Rolls Out File Security System
Products and Releases  |  2/5/2010  | 
Call-Home, from InDorse Technologies, tracks file activities
InfoExpress Adds Virtual Appliance To Its CyberGatekeeper Family Of NAC Products
Products and Releases  |  2/5/2010  | 
CyberGatekeeper virtual NAC policy server establishes what policies need to be enforced based on endpoint assessment, connection method and behavior of the device
Sunbelt Software Announces Top 10 Malware Threats For January
Products and Releases  |  2/5/2010  | 
Anti-malware developer finds continued prevalence of Trojan horse programs
Unisys Awarded Contract to Provide Biometric Citizen Identification Solution For Mexico
Products and Releases  |  2/5/2010  | 
Unisys to provide technology to create new database to identify Mexican citizens using iris, fingerprint and facial biometric data
Report: Corporate Departments Left Open To Voice Call Interception
Products and Releases  |  2/5/2010  | 
Sensitive departments within organizations are being left vulnerable to mobile phone call interception, a new survey shows
Windows File System Attack To Be Demo'ed At Shmoocon
Products and Releases  |  2/4/2010  | 
Core Security Technical Support engineer Dan Crowley will present "Windows File Pseudonyms: Strange filenames"
DataInherit Launches A Free High Security Online Password Safe
Products and Releases  |  2/4/2010  | 
New cloud computing services aimed at password and document storage
McAfee Announces Quickstart Services For SMBs
Products and Releases  |  2/3/2010  | 
McAfee Security Quickstart Services will aid SMBs in getting set up and trained on their security products
Retired USAF General Publishes White Paper on U.S. Strategy For Cyberwar And Cyberterrorism
Products and Releases  |  2/2/2010  | 
'Our failure to proactively address this threat risks a digital Pearl Harbor or 9-11,' writes Gen. Eugene Habiger
Cisco: 87% Of Europeans With Wireless Internet At Home Have Enabled Security
Products and Releases  |  2/2/2010  | 
U.K. and Germany lead in wireless security, while Spain, Italy, and the U.K. top the list of the most wireless Internet-enabled countries
PGP Corporation Acquires TC TrustCenter & ChosenSecurity
Products and Releases  |  2/2/2010  | 
Acquisition accelerates plans to enable trust across multiple security applications
LogRhythm Granted Patent For Log And Event Management Technology
Products and Releases  |  2/1/2010  | 
Patent covers content-aware log processing, log management, log analysis, and event management
Wipro, Trend Micro Unite to Deliver Next-Generation Virtualization Security Solutions For Dynamic Datacenters
Products and Releases  |  2/1/2010  | 
Industry leaders to develop new 'Center of Excellence' products and solutions that address private and public cloud security
Netgear Brings Enterprise-Class Security To Small Businesses And Telecommuters For Under $300
Products and Releases  |  2/1/2010  | 
ProSecure UTM5 enables small companies to protect themselves using a wide array of defenses
VeriSign Identity Protection Mobile Application on Verizon Wireless Phones Makes Security More Accessible
Products and Releases  |  2/1/2010  | 
VIP Access for Mobile is a free application that transforms mobile devices into VIP authentication credential
Encryption Firm Says No One Stepped Up To Claim $250k In Pure Gold
Products and Releases  |  2/1/2010  | 
Gold Lock had offered the prize to anyone who was able to provide a transcript of an encrypted cellular conversation contained in a file on the company's website
Sophos Report: Malware And Spam Rise 70% On Social Networks
Products and Releases  |  2/1/2010  | 
'Social Security' investigation reveals that criminals have increasingly focused attacks on social networking users in the past 12 months
<<   <   Page 2 / 2

How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-05
In SPIRE before versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1, the &quot;aws_iid&quot; Node Attestor improperly normalizes the path provided through the agent ID templating feature, which may allow the issuance of an arbitrary SPIFFE ID within the same trust domain, if the attacker controls the v...
PUBLISHED: 2021-03-05
An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during m...
PUBLISHED: 2021-03-05
An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest physical addresses when a configuration has CONFI...
PUBLISHED: 2021-03-05
An issue was discovered in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is reached.
PUBLISHED: 2021-03-05
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.