Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2012
<<   <   Page 2 / 3   >   >>
Narus And Teradata Establish Powerful Partnership To Change The Game Against Cyber Threats
Products and Releases  |  2/27/2012  | 
New Narus-on-Teradata capability is tailored to the needs of organizations seeking real-time cybersecurity solutions
NQ Mobile Partners With Telefonica's BlueVia To Protect Android Users Around The World
Products and Releases  |  2/27/2012  | 
Starting in Spain, Germany and Argentina, the BlueVia APIs will enable NQ Mobile to access key network assets, and data
GigaTrust Announces Cloud Based Email & Document Security Services For Mobile Devices
Products and Releases  |  2/27/2012  | 
Mobility Cloud Service is a standalone Rights Management supported service
Cloud Data Encryption Solutions Provider Vaultive Raises $10 Million
Products and Releases  |  2/27/2012  | 
Xompany is currently in beta for its first product, Vaultive for Hosted Exchange
Secunia Launches New Version Of Personal Security Inspector
Products and Releases  |  2/27/2012  | 
Secunia PSI 3.0 includes automatic patching of software
Commtouch Launches Enhanced Antivirus For Email Solution
Products and Releases  |  2/27/2012  | 
Antivirus for Email uses a unique dual-detection approach to ensure malware identification from the zero-hour of an outbreak
Sourcefire Announces NGIPS With Application Control
Products and Releases  |  2/27/2012  | 
Enables companies to control access to thousands of applications and provides custom detection and control for homegrown applications
RSA Unveils Industry-Leading Capabilities For Threat Information Sharing
Products and Releases  |  2/27/2012  | 
RSA introduces enhancements to the RSA NetWitness Live platform
nCircle And Core Security Announce Partnership
Products and Releases  |  2/27/2012  | 
Companies to integrate cloud, virtual and appliance solutions, and jointly go to market
McAfee Announces New Versions: Enterprise Mobility Management And VirusScan Mobile
Products and Releases  |  2/27/2012  | 
McAfee is also announcing a new version of McAfee VirusScan Mobile Security for Enterprise
GSMA Announces New Initiative Addressing Mobile App Privacy
Products and Releases  |  2/27/2012  | 
Publishes a set of global Privacy Design Guidelines for Mobile Application Development
Symplified Integrates With Symantec VIP To Extend Strong Authentication To Cloud And Mobile Apps
Products and Releases  |  2/26/2012  | 
Symplified provides a self-service portal for Symantec VIP provisioning
Affinion Security Center Augments Data Breach Solution
Products and Releases  |  2/26/2012  | 
Adding child Social Security number monitoring and application monitoring to BreachShield data breach response solution
MBX Systems Offers Free Configuration Analysis For Security Appliances
Products and Releases  |  2/26/2012  | 
Five-point analysis will include BOM review, component evaluation
Cross-Industry Survey Reveals Only 27 Percent Understand What 'Big Data' Means, Yet 49 Percent Are Concerned About It
Products and Releases  |  2/24/2012  | 
Top Finding of Survey: Major Disconnects in Understanding and Managing Big Data and IT Data in the Cloud
FireEye Advanced Threat Report Finds Fastest Growing Categories In The Second Half of 2011 Were Information Stealers And Pay-Per-Install Malware
Products and Releases  |  2/24/2012  | 
The Top 50 malware families were responsible for 80% of successful infections
Survey Highlights Webmasters' Struggles with Hacked Sites
Products and Releases  |  2/23/2012  | 
Commtouch and StopBadware Publish Report on Compromised Websites from Site Owner Perspective
ThreatMetrix Launches TrustDefender Mobile to Help Identify Fraudulent Transactions Originating From Mobile Apps
Products and Releases  |  2/23/2012  | 
New software development kit screens for fraud with mobile apps
Juniper Networks Acquires Web Application Security Leader Mykonos Software for $80 Million
Products and Releases  |  2/22/2012  | 
This acquisition allows Juniper to extend its security portfolio with the only intrusion deception system in the industry capable of detecting an attacker before an attack is in progress
M3AAWG to Aggregate First ISP Bot Stats in Support of FCC Cybersecurity Efforts
Products and Releases  |  2/22/2012  | 
M3 Anti-Abuse Working Group will aggregate bot data from ISPs
Webroot Rolls Out Cloud-Based Endpoint Security
Products and Releases  |  2/21/2012  | 
Webroot SecureAnywhere Business liberates IT managers from traditional software that fails to protect them, drains resources and frustrates users
CounterTack Launches Event Horizon 3.1 Platform and Three Intelligence Solutions Aimed At In-Progress Advanced Cyber Attacks
Products and Releases  |  2/21/2012  | 
CounterTack to unveil next generation version of the industry’s only commercially available security platform using virtual machine introspection at booth #845 during RSA Conference 2012
NSS Labs Moves To Subscription-Based Model
Products and Releases  |  2/17/2012  | 
Company has ceased selling individual reports
Trend Micro Releases HijackThis Source Code To sourceforge.net
Products and Releases  |  2/17/2012  | 
HijackThis scans a computer to find settings changed by spyware, malware, or other unwanted programs
AlgoSec Automates Management Of Next-Generation Network Security Infrastructure
Products and Releases  |  2/16/2012  | 
Security Management Suite provides automated policy analysis and complete change lifecycle management for Palo Alto Networks devices
Aberdeen Group Sees Classification As Key To Successful Data Loss Prevention
Products and Releases  |  2/16/2012  | 
'You can’t protect what you don’t manage, and you can’t manage what you don’t know about,” says Aberdeen's Derek Brink
Layered Tech Becomes First Hosting And Cloud Provider Offers Compliance Guarantee
Products and Releases  |  2/16/2012  | 
Company is adding an SLA so that all of its compliance services are guaranteed to pass 100 percent of every audit or assessment
Genetics Inspired Research Prevents Cyber Attacks
Products and Releases  |  2/16/2012  | 
Researchers aim to improve defense mechanisms of similar computing infrastructures with minimal human interaction
Trend Micro Reports Results For Q4 And Fiscal Year 201
Products and Releases  |  2/16/2012  | 
For the fourth quarter, Trend Micro posted consolidated net sales of US $311 million
Acunetix Web Rolls Out Vulnerability Scanner 8
Products and Releases  |  2/16/2012  | 
Acunetix WVS can automatically identify URL parameters and manipulate them to detect vulnerabilities
PandaLabs Reports Presence Of New Powerful Bot Spread By Email
Products and Releases  |  2/16/2012  | 
Ainslot.L bot scans computers and removes other bots it finds
45% Of European IT Decision Makers View Security And SLAs As Leading Barriers To Cloud
Products and Releases  |  2/16/2012  | 
Insight into cloud trends reveals opportunity for service providers and system integrators to support companies’ transition to cloud
Application Security Inc.'s New DbProtect Active Discovery Finds Forgotten And Previously Unknown Databases
Products and Releases  |  2/15/2012  | 
DbProtect Active Discovery uses database protocol-based validation
Lighthouse Security Group Announces Next-Generation Lighthouse Gateway Cloud Identity And Access Management Platform
Products and Releases  |  2/15/2012  | 
Company also announces expansion of operations to support launch
Catbird, VMware Team On Cloud Sec App
Products and Releases  |  2/15/2012  | 
VMware vShield App controls are now available for Catbird vSecurity
Commtouch Launches Outbound Spam Protection Module For Parallels Plesk Panel
Products and Releases  |  2/15/2012  | 
Solution prevents blacklisting of hosting provider networks
Websense Adds Modular Chassis That Scales For Large Enterprises And Prevents Data Loss
Products and Releases  |  2/15/2012  | 
Websense X10G embeds enterprise-class DLP for data-aware contextual security policies
Trend Micro Develops Advanced Cloud-Based Mobile Application Scanning Technology
Products and Releases  |  2/15/2012  | 
Trend Micro Mobile App Reputation can automatically identify, analyze, and rate mobile applications for issues
Porticor Unveils Encryption And Key Management Solution Protecting Cloud Data
Products and Releases  |  2/15/2012  | 
Porticor Virtual Private Data system ensures the privacy of data stored in the cloud
Biometric Authentication Business Launches
Products and Releases  |  2/15/2012  | 
Natural security announces its international launch plans for 2012
Norman Data Defense Systems Announces New SCADA Security System To Protect Industrial Infrastructure
Products and Releases  |  2/14/2012  | 
Norman SCADA Protection installed at the network perimeter
Symantec Control Compliance Suite 11 Release
Products and Releases  |  2/14/2012  | 
Symantec Control Compliance Suite 11 features the new Control Compliance Suite Risk Manager module
ID Experts Announces New Breach Product
Products and Releases  |  2/14/2012  | 
RADAR 2.0 meets federal and state risk assessment and reporting requirements for privacy, security, and data breach incidents
Barracuda Networks Integrates Next Generation Firewall And Cloud Web Security
Products and Releases  |  2/14/2012  | 
Company combines Barracuda NG Firewall and Barracuda Web Security Flex
Confidential Data At Risk Even With Policies In Place; Xerox And McAfee Team Up To Deliver A New Level Of Protection
Products and Releases  |  2/14/2012  | 
New survey says more than half of workers don’t always follow or are unaware of their company’s security policies
Experian Data Breach Resolution Launches Innovative Mobile Application for First Responders
Products and Releases  |  2/13/2012  | 
App to help legal, compliance and security professionals respond to a data breach
NEC Adds CA Technologies Advanced Authentication To Provide A Robust Security Service From The Cloud
Products and Releases  |  2/13/2012  | 
New cloud service offers authentication through identity links among multiple NEC websites
HiSoftware Releases New SharePoint DLP Solution
Products and Releases  |  2/13/2012  | 
Security Sheriff SP automates encryption of documents at the file level
Trend Micro Extends Web Security Services To PlayStation Vita; Available Worldwide
Products and Releases  |  2/13/2012  | 
Two services leverage Trend Micro's URL filtering and Web reputation technologies
ControlScan Launches ProTect Managed Security Services
Products and Releases  |  2/10/2012  | 
Service improves the security of websites and Web applications
<<   <   Page 2 / 3   >   >>

Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-14
Buffer Overflow in Tenda G1 and G3 routers with firmware version V15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/&quot;IPMacBindIndex &quot;request. This occurs because the &quot;formIPMacBindDel&quot; function directly passes the parameter &quot;IPMacBind...
PUBLISHED: 2021-04-14
Buffer Overflow in Tenda G1 and G3 routers with firmware v15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/&quot;portMappingIndex &quot;request. This occurs because the &quot;formDelPortMapping&quot; function directly passes the parameter &quot;portMappingIn...
PUBLISHED: 2021-04-14
An issue was discovered in Forescout CounterACT before 8.1.4. A local privilege escalation vulnerability is present in the logging function. SecureConnector runs with administrative privileges and writes logs entries to a file in %PROGRAMDATA%\ForeScout SecureConnector\ that has full permissions for...
PUBLISHED: 2021-04-14
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the ChromaBroadcast subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other wor...
PUBLISHED: 2021-04-14
Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other wo...