Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2012
Page 1 / 3   >   >>
Survey Says 51 Percent Of Organizations Lose Data Through Mobile Devices, 59 Percent Of Employees Dodge Security Controls
Products and Releases  |  2/29/2012  | 
Mobile devices help business, but security is needed to prevent costly data loss
EMC Helps Customers Enable Trusted IT With Five New Security And Risk Management Advisory Services
Products and Releases  |  2/29/2012  | 
New services help organizations ensure their information is secure, regulation compliant, and meets business requirements
Leading Cybersecurity Certification Groups Form Industry Collaborative
Products and Releases  |  2/29/2012  | 
Cybersecurity Credentials Collaborative priorities include advocacy, research, and improving skills
Lumeta Announces IPsonar 5.4
Products and Releases  |  2/29/2012  | 
New offering highlights areas of the network edge that intruders can infiltrate to potentially leak customer data, intellectual property and more out of enterprise networks
EnCase Enterprise Version 7 Addresses Needs Of Evolving Digital Investigations Market
Products and Releases  |  2/29/2012  | 
Solution includes integrated smartphone support, revamped user experience, and template-driven processing
NTT America And Integralis Partner To Ease Global Enterprise Cloud Deployments
Products and Releases  |  2/29/2012  | 
NTT America brings virtualized global data centers and high-speed networks to enterprise cloud computing, while Integralis offers comprehensive Managed Security Solutions
Appthority And Appcelerator Unveil Secure Enterprise App Development Solution
Products and Releases  |  2/29/2012  | 
Appcelerator’s customers will be able to generate the Appthority Platform report for each mobile app developed on Appcelerator’s Titanium platform
Nearly 40 Percent Of IT Decision Makers Report Unintentional Exposure Of Corporate Data Through Theft Or Loss Of Removable Devices
Products and Releases  |  2/28/2012  | 
Imation survey reveals that 91 percent of companies allow removable storage devices on their corporate networks, but only 34 percent enforce encryption on those devices
Kingston Digital Lowers Costs and Increases Capacity For Enterprise-Class, Ultra-Secure USB Flash Solutions
Products and Releases  |  2/28/2012  | 
DataTraveler 4000 and DataTraveler Vault ― Privacy (DTVP) Managed and Unmanaged secure mobile storage solutions get capacity boost
Trusted Computing Group Opens Security Efforts To Enterprise Users With New Membership Option
Products and Releases  |  2/28/2012  | 
Associate members can participate in established solutions work groups or develop new ones for any of the organization’s areas of focus
tudy Reveals That Encryption is Critical to Increase Security Posture, Report Thales And Ponemon Institute
Products and Releases  |  2/28/2012  | 
Multinational survey concludes that encryption and key management have become strategic business issues to address compliance and manage risk
Symantec And VMware Partner To Deliver Extensive Protection For Virtual And Cloud Environments
Products and Releases  |  2/28/2012  | 
Companies announce five new security integrations with the VMware cloud infrastructure suite
WinMagic Launches SecureDoc Version 5.3 Full-Disk Encryption With Wireless PBConnex At RSA Conference
Products and Releases  |  2/28/2012  | 
SecureDoc Version 5.3 adds wireless capabilities to PBConnex pre-boot network authentication
Proofpoint Extends Data Protection And Information Governance Solutions to Address Cloud-Based File Sharing, Collaboration And Social Media
Products and Releases  |  2/28/2012  | 
Proofpoint also announced a new integration with Box to offer enhanced security, compliance and control over documents shared via Box
TITUS: Can Organizations Keep Sensitive Data Secure While Embracing The Cloud?
Products and Releases  |  2/28/2012  | 
Company introduces enterprise cloud data security solutions
Damballa Discovers Advanced Evasion Techniques Being Used By Six Crimeware Families To Carry Out Global Cyberattacks
Products and Releases  |  2/28/2012  | 
Crimeware has been evading detection because cybercriminals are rapidly adopting domain generation algorithms
GigaTrust Offers Enterprise Rights Management To The Android Smartphone
Products and Releases  |  2/28/2012  | 
Product consists of client and mobility server components
OneLogin Debuts Mobile One-Time Password App At RSA Conference 2012
Products and Releases  |  2/28/2012  | 
Available on all major smartphone platforms
Appthority Launches Platform, Named Winner For "Most Innovative Company At RSA Conference 2012"
Products and Releases  |  2/28/2012  | 
Appthority Platform enhances the security capabilities of enterprises' existing mobile solutions
Cyberoam Launches Web Application Firewall In Its UTM Appliance Range At RSA Conference 2012
Products and Releases  |  2/28/2012  | 
WAF feature adds strong layer of protection to corporate Web sites and Web-based applications
Narus Cyber Survey: Situational Awareness Essential To Protect Critical Infrastructure
Products and Releases  |  2/28/2012  | 
More than 55 percent of respondents are concerned that their company is not equipped to protect its networks from cyberattacks
Microsoft Outlines Evolved Security, Privacy And Reliability Strategies For Cloud And Big Data
Products and Releases  |  2/28/2012  | 
Trustworthy Computing Next advocates for continued focus amid new computing inflection points
RSA Collaborates With Mobile Technology Partners To Help Assure Trust For Mobile Business
Products and Releases  |  2/28/2012  | 
Companies integrating RSA mobile authentication into virtual desktop, virtual application, and VPN solutions
Guidance Software And FireEye Forge Malware Alliance
Products and Releases  |  2/28/2012  | 
Companies will integrate their security incident response and malware detection products
Arbor Rolls Out New Version Of DDoS Protection
Products and Releases  |  2/28/2012  | 
Pravail Availability Protection System includes enhanced protections for critical services such as SSL and content delivery networks
HID Global Demonstrates First Single-Provider Solution For Physical-Logical Access At RSA Conference 2012
Products and Releases  |  2/28/2012  | 
ActivIdentity fraud detection service part of company's Identity Assurance business
Quest Software Announces Complete Solution For Identity And Access Management
Products and Releases  |  2/27/2012  | 
Quest One Identity Solutions reinforced by the newly acquired BiTKOO granular access technology
FireEye Announces File Malware Protection System To Detect And Eliminate Malware Resident On File Shares
Products and Releases  |  2/27/2012  | 
New offering stops malware introduced by users collaborating through Web mail, online file transfer tools, personal storage devices, or other manual means
Bit9 Announces New Platform To Stop Advanced Persistent Threats
Products and Releases  |  2/27/2012  | 
Bit9 Advanced Threat Protection Platform also stops dangerous malware and protects enterprises against intellectual property theft
Cloud Security Alliance Launches Mobile And Innovation Initiatives At RSA
Products and Releases  |  2/27/2012  | 
CSA’s initiatives in these areas are threefold
Stonesoft Defines The Future Of Network Security With Transformable Security Engine
Products and Releases  |  2/27/2012  | 
Stonesoft Security Engine can be configured to act as a traditional and/or next generation firewall
GlobalSCAPE Gives Business Users Secure And Convenient Mobile File Access
Products and Releases  |  2/27/2012  | 
Secure Mobile Access module represents first significant product integration with mobile file sharing innovator TappIn
AhnLab Unveils Anti-APT Solution With Innovative Threat Prevention Technology
Products and Releases  |  2/27/2012  | 
TrusWatcher allows organizations to protect their IT systems and digital assets against APT attacks
Rapid7 And Modulo Deliver Integrated Vulnerability Risk And IT GRC Solutions To Empower Risk Management Programs
Products and Releases  |  2/27/2012  | 
As part of the alliance, the companies also announced that penetration testing risk data will be integrated in Q3 2012
Lieberman Software Detects And Secures Well Known Default Passwords
Products and Releases  |  2/27/2012  | 
Enterprise Random Password Manager now offers a solution to identify known, built-in administrator passwords in the network
Voltage Security Extends Data-Centric Mobile Security With Voltage Security Mobile Plus Initiative
Products and Releases  |  2/27/2012  | 
Voltage Security Mobile Plus initiative will protect mobile data in a number of ways
Radiant Logic Announces Federated Identity Solution Based On Virtualization
Products and Releases  |  2/27/2012  | 
RadiantOne 6.0 features a dynamic set of tools
Silicium Security Partners With SurfRight To Provide Malware Removal Integrated In ECAT
Products and Releases  |  2/27/2012  | 
ECAT customers will now be able to push a silent background remediation agent to machines identified as compromised with known malware
BAE Systems STOP OS Secure Application Platform Achieves Common Criteria EAL 4+ Security Certification
Products and Releases  |  2/27/2012  | 
STOP OS is certified to run on all x86-based hardware, real or virtualized
Critical Watch Launches Security Analytics Technology
Products and Releases  |  2/27/2012  | 
Active Countermeasure Intelligence unifies and automates security management
Fasoo Launches Three Solutions At RSA 2012 To Provide Advanced, Persistent Data Protection In The Cloud
Products and Releases  |  2/27/2012  | 
Fasoo Usage Tracer maintains detailed activity logs for all protected documents throughout their entire life cycle
Tufin Adds Interactive Dashboards And Automated Change Provisioning To The Tufin Security Suite
Products and Releases  |  2/27/2012  | 
TSS R12-1 features an Interactive Dashboard, Automated Change Provisioning, and a new Policy Analysis interface
Qualys Launches Enterprise Edition Of Malware Detection Service
Products and Releases  |  2/27/2012  | 
Delivered as part of the QualysGuard Cloud Platform and suite of integrated applications for security and compliance
Pwnie Express Rolls Out Pwn Plug
Products and Releases  |  2/27/2012  | 
Pwnie Express specializes in cybersecurity testing hardware
CA Technologies Extends Content-Aware Identity And Access Management, Delivers Security Solution For Microsoft SharePoint
Products and Releases  |  2/27/2012  | 
Company enhances CA SiteMinder, CA DataMinder
Lancope Showcases New Virtualized Solution and Enhanced Contextual Awareness For Secure, High-Performance Networks
Products and Releases  |  2/27/2012  | 
StealthWatch 6.2 helps customers address evolving network trends
WatchGuard Bolsters Small Business Security Lineup With Two New UTM Appliances
Products and Releases  |  2/27/2012  | 
WatchGuard XTM 25 and XTM 26 ideal for small businesses, wireless hotspots, and branch offices
Softex Announces SecureDisable Asset Protection Capability
Products and Releases  |  2/27/2012  | 
Solution can lock down lost or stolen Intel processor-based notebooks
Fluke Networks Redefines Cost Model For Dedicated MonitoringOf Wireless LANs
Products and Releases  |  2/27/2012  | 
New version of AirMagnet Enterprise features software-based sensor
New Research Reveals Cyber Risk Still Not Getting Adequate Attention From Boards And Senior Executives
Products and Releases  |  2/27/2012  | 
Less than one-third of the respondents indicate their boards and senior executives are undertaking basic responsibilities for cyber governance
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.