Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2013
Page 1 / 3   >   >>
Kindsight Empowers Internet Service Providers To Defend Against Botnets
Products and Releases  |  2/28/2013  | 
Kindsight Botnet Security service analyzes Internet traffic for communications between infected devices and the bot masters’ C&C servers
Lockheed Martin: Lockheed Martin Named As A Commercial Cyber Security Provider By Department Of Homeland Security
Products and Releases  |  2/28/2013  | 
DHS to provide government-furnished information to Lockheed Martin
Comodo Introduces Endpoint Security Solution
Products and Releases  |  2/28/2013  | 
Panoramic display technology lets IT managers see endpoints' 12 critical metrics in one view
Ponemon Survey: Securing Outsourced Consumer Data
Products and Releases  |  2/28/2013  | 
Survey reveals 56 percent of respondents acknowledged incidents when their organizations did not act on a vendor’s data breach
Remotium Named “Most Innovative Company At RSA Conference 2013”
Products and Releases  |  2/27/2013  | 
Remotium was selected from a group of ten finalists presenting at the Conference’s annual Innovation Sandbox program
Bit9 Announces Real-Time Endpoint And Network Security Integration Strategy
Products and Releases  |  2/27/2013  | 
Company will partner with network security providers
Damballa And F-Secure Partner To Deliver Secure Internet Services
Products and Releases  |  2/27/2013  | 
Partnership will enable automated detection and remediation of infected subscriber devices on ISP and telco operator networks
V-Key Hires Two Top-Tier Executives
Products and Releases  |  2/27/2013  | 
Richard Trovato and Matt Rose have joined the company as Senior Vice President Sales and Vice President of Mobile Solutions, respectively
Ixia, LogRhythm SIEM Work Together On Network Security Incident Remediation Solution
Products and Releases  |  2/27/2013  | 
Joint solution enables automatic capture of network packet data associated with security events
nCircle Doubles Number Of Free Scorecards Available In nCircle Benchmark
Products and Releases  |  2/27/2013  | 
Service enables organizations to use key metrics to compare the performance of their entire IT security ecosystem against their own goals and industry peers
HyTrust Wins Major Patents For Automated Cloud Security And Virtual Infrastructure Management
Products and Releases  |  2/27/2013  | 
Patents automate risk mitigation and compliance in virtualized infrastructure, and ease adoption of multitenant clouds
Splunk Appoints Tim Mather As CISO And VP of Security And Compliance Markets
Products and Releases  |  2/27/2013  | 
Mather will serve as the team leader for the company’s initiatives in security and compliance
TITUS SharePoint Security Suite Fully Supports Microsoft SharePoint 2013
Products and Releases  |  2/27/2013  | 
Offering automatically enforces fine-grained access control policies and applies visual labels
McAfee Security Innovation Alliance Announces New Partners And Integrated Solutions
Products and Releases  |  2/27/2013  | 
Eight other SIA partners promoted to Technology Partner status
Spirent Adds Support For Malware Testing With Realistic Threat Assessment
Products and Releases  |  2/27/2013  | 
Spirent Studio, Spirent Avalanche test malware handling capabilities of network security devices
Secunia Enters Mobile Security Market With PSI For Android
Products and Releases  |  2/27/2013  | 
Solution scans Android devices for vulnerable apps
FireEye And Guidance Software Partner To Deliver Integrated Cyber Attack Detection And Incident Response Solution
Products and Releases  |  2/26/2013  | 
FireEye-EnCase Cybersecurity joint solution designed to automate the incident response workflow
Lastline Report Finds Evasive Threats On The Rise
Products and Releases  |  2/26/2013  | 
“The Security Threat of Evasive Malware” details how malware authors are exploiting the limited visibility of sandboxes
Stonesoft Releases Evader 2.01 Advanced Evasion Testing Tool
Products and Releases  |  2/26/2013  | 
Free security software identifies weaknesses in company networks against advanced evasion techniques
ManageEngine Debuts Enhancements To Password Manager Pro
Products and Releases  |  2/26/2013  | 
New iPhone app lets IT security pros manage privileged passwords while on the go
McAfee Acquires LynuxWorks
Products and Releases  |  2/26/2013  | 
Adds ValidEdge sandboxing technology to portfolio
HID Global Unveils Turnkey ActivID Appliance Solution For Strong And Versatile Authentication
Products and Releases  |  2/26/2013  | 
Appliance is a full SAML v2 compliant identity provider
OneLogin Announces 12 Millionth Licensed User
Products and Releases  |  2/26/2013  | 
Cloud identity management provider reaches 700 customers
Allegro Software Announces Integrated Embedded Device Security And FIPS 140-2 Compliance
Products and Releases  |  2/26/2013  | 
Announced addition of FIPS 140-2 compliant Allegro Cryptography Engine to RomPager suite of embedded Internet toolkits
Splunk And Palo Alto Networks Join Forces To Enhance Enterprise Security Intelligence
Products and Releases  |  2/26/2013  | 
Splunk App for Palo Alto Networks 3.0 enables users to leverage big data to analyze risk, improve security posture, and compliance
Solera Networks And Ponemon Study Reveals Rise in Security Breaches, With Organizations Taking Months To Detect And Contain Them
Products and Releases  |  2/26/2013  | 
According to the majority of respondents, data breaches have increased in both severity and frequency in the past 24 months
Mandiant Launches New Threat Intelligence Offering
Products and Releases  |  2/26/2013  | 
Threat Intelligence provides customers with the analytical tools and contextual analysis to help customers better understand high priority threats
Lieberman Software Brings Compartmentalized Password Segmentation To Privileged Account Management
Products and Releases  |  2/26/2013  | 
Enterprise Random Password Manager can break up static and dynamic privileged account passwords into as many different segments as required
Tufin Survey Reveals No. 1 Use Case For Firewall Management
Products and Releases  |  2/26/2013  | 
Announces results of annual Firewall Management Survey
RSA Transforms Enterprise Authentication With Big Data-Driven Risk Analytics
Products and Releases  |  2/26/2013  | 
RSA Authentication Manager 8 analyzesf risk factors to verify and authorize end-user access to corporate or cloud-based resources
CloudLock Unveils Industry First Community Trust Rating For Google Apps
Products and Releases  |  2/26/2013  | 
CloudLock’s Community Trust Rating helps businesses evaluate which third-party applications should be granted access to employee data
Websense And Leading Technology Partners Tackle Security Challenges Of Evolving Networks
Products and Releases  |  2/26/2013  | 
Websense expands TRITON Security Alliance
CounterTack Announces Scout V3.2
Products and Releases  |  2/26/2013  | 
CounterTack Scout offers a platform for next-generation honeynet deployments
SAFECode Names Howard Schmidt Executive Director
Products and Releases  |  2/25/2013  | 
The former White House cybersecurity adviser brings to SAFECode more than 40 years of information security experience
Thales And Ponemon Institute Study Shows Encryption And Key Management Increasingly Viewed As Strategic Issues
Products and Releases  |  2/25/2013  | 
Global Encryption Trends Study shows steady increase in the deployment of encryption solutions
AlgoSec Unveils Enhanced Security Management Suite Featuring Innovative Application-Centric Policy Management
Products and Releases  |  2/25/2013  | 
New version marks the general availability of AlgoSec BusinessFlow as an integral product of the suite
RSA And Juniper Networks To Expand Technology Partnership To Address Advanced Threats And Mobile Security
Products and Releases  |  2/25/2013  | 
Juniper to embed RSA mobile authentication technologies into the Junos Pulse SSL Secure product
FireEye Platform Extends Tech To Partner
Products and Releases  |  2/25/2013  | 
Platform is formed by three core components that work in concert
Co3 Systems Delivers Security Incident Response In Major Platform Expansion
Products and Releases  |  2/25/2013  | 
Provides automated, single-pane incident management in a secure, isolated environment for general security incidents
Juniper Networks Announces Industry-First Device Level Fingerprinting
Products and Releases  |  2/25/2013  | 
Junos Spotlight Secure is cloud-based global attacker intelligence service that fingerprints hackers at the device level
Trend Micro Announces New Mobile Security For Consumers With Privacy Protection For Facebook
Products and Releases  |  2/25/2013  | 
Trend Micro Mobile Security 3.0 also includes faster malware scanning
Centrify And Samsung Partner To Deliver Industry’s First Comprehensive, Enterprise-Ready Mobile Solution For Work And Personal Use
Products and Releases  |  2/25/2013  | 
Centrify will enable multiapplication SSO for mobile and Web apps inside the Samsung KNOX container
New Research From Nominum Reveals Worst Global Cyber Threats Of 2012
Products and Releases  |  2/25/2013  | 
Majority of attacks were carried by malicious bots that were previously unknown
Akamai Raises Bar For Web Security With Enhancements To Kona Site Defender
Products and Releases  |  2/25/2013  | 
Included in the new version of Kona Site Defender are upgraded Web Application Firewall (WAF) capabilities and network layer controls
Lumension Endpoint Management Security Platform Furthers Advanced Persistent Security Offerings
Products and Releases  |  2/25/2013  | 
Company adds new features to endpoint management suite and demonstrates new mobile device management at RSA 2013 Conference
Trend Micro Steps Up Privacy Protection For Mobile Users
Products and Releases  |  2/25/2013  | 
Launching next version of Trend Micro Mobile Security for Android
RSA Launches RSA NextGen Security Operations Services To Help Customers Build Battle-Ready Cyber Defenses
Products and Releases  |  2/25/2013  | 
Escalation of cyberthreats is driving organizations to revamp their approach to prepare for, respond to, and mitigate advanced cyberthreats
Commtouch's URL Filtering Enhances Email Security For Return Path's Clients, Partners
Products and Releases  |  2/22/2013  | 
Commtouch's URLF detects compromised URLs in real time and prevents piracy of email platforms
Zscaler Delivers "Big Visibility" Security Analytics For Real-Time Insight Into Global Cloud, Web, Mobile Traffic
Products and Releases  |  2/22/2013  | 
Gives global visibility into Internet traffic across Web, email, and mobile
Commtouch Reports Fourth Quarter And Full Year 2012 Results
Products and Releases  |  2/22/2013  | 
Full year 2012 revenues totaled $23.9 million, an increase of 4.0% over 2011
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file