Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2013
Page 1 / 3   >   >>
Kindsight Empowers Internet Service Providers To Defend Against Botnets
Products and Releases  |  2/28/2013  | 
Kindsight Botnet Security service analyzes Internet traffic for communications between infected devices and the bot masters’ C&C servers
Lockheed Martin: Lockheed Martin Named As A Commercial Cyber Security Provider By Department Of Homeland Security
Products and Releases  |  2/28/2013  | 
DHS to provide government-furnished information to Lockheed Martin
Comodo Introduces Endpoint Security Solution
Products and Releases  |  2/28/2013  | 
Panoramic display technology lets IT managers see endpoints' 12 critical metrics in one view
Ponemon Survey: Securing Outsourced Consumer Data
Products and Releases  |  2/28/2013  | 
Survey reveals 56 percent of respondents acknowledged incidents when their organizations did not act on a vendor’s data breach
Remotium Named “Most Innovative Company At RSA Conference 2013”
Products and Releases  |  2/27/2013  | 
Remotium was selected from a group of ten finalists presenting at the Conference’s annual Innovation Sandbox program
Bit9 Announces Real-Time Endpoint And Network Security Integration Strategy
Products and Releases  |  2/27/2013  | 
Company will partner with network security providers
Damballa And F-Secure Partner To Deliver Secure Internet Services
Products and Releases  |  2/27/2013  | 
Partnership will enable automated detection and remediation of infected subscriber devices on ISP and telco operator networks
V-Key Hires Two Top-Tier Executives
Products and Releases  |  2/27/2013  | 
Richard Trovato and Matt Rose have joined the company as Senior Vice President Sales and Vice President of Mobile Solutions, respectively
Ixia, LogRhythm SIEM Work Together On Network Security Incident Remediation Solution
Products and Releases  |  2/27/2013  | 
Joint solution enables automatic capture of network packet data associated with security events
nCircle Doubles Number Of Free Scorecards Available In nCircle Benchmark
Products and Releases  |  2/27/2013  | 
Service enables organizations to use key metrics to compare the performance of their entire IT security ecosystem against their own goals and industry peers
HyTrust Wins Major Patents For Automated Cloud Security And Virtual Infrastructure Management
Products and Releases  |  2/27/2013  | 
Patents automate risk mitigation and compliance in virtualized infrastructure, and ease adoption of multitenant clouds
Splunk Appoints Tim Mather As CISO And VP of Security And Compliance Markets
Products and Releases  |  2/27/2013  | 
Mather will serve as the team leader for the company’s initiatives in security and compliance
TITUS SharePoint Security Suite Fully Supports Microsoft SharePoint 2013
Products and Releases  |  2/27/2013  | 
Offering automatically enforces fine-grained access control policies and applies visual labels
McAfee Security Innovation Alliance Announces New Partners And Integrated Solutions
Products and Releases  |  2/27/2013  | 
Eight other SIA partners promoted to Technology Partner status
Spirent Adds Support For Malware Testing With Realistic Threat Assessment
Products and Releases  |  2/27/2013  | 
Spirent Studio, Spirent Avalanche test malware handling capabilities of network security devices
Secunia Enters Mobile Security Market With PSI For Android
Products and Releases  |  2/27/2013  | 
Solution scans Android devices for vulnerable apps
FireEye And Guidance Software Partner To Deliver Integrated Cyber Attack Detection And Incident Response Solution
Products and Releases  |  2/26/2013  | 
FireEye-EnCase Cybersecurity joint solution designed to automate the incident response workflow
Lastline Report Finds Evasive Threats On The Rise
Products and Releases  |  2/26/2013  | 
“The Security Threat of Evasive Malware” details how malware authors are exploiting the limited visibility of sandboxes
Stonesoft Releases Evader 2.01 Advanced Evasion Testing Tool
Products and Releases  |  2/26/2013  | 
Free security software identifies weaknesses in company networks against advanced evasion techniques
ManageEngine Debuts Enhancements To Password Manager Pro
Products and Releases  |  2/26/2013  | 
New iPhone app lets IT security pros manage privileged passwords while on the go
McAfee Acquires LynuxWorks
Products and Releases  |  2/26/2013  | 
Adds ValidEdge sandboxing technology to portfolio
HID Global Unveils Turnkey ActivID Appliance Solution For Strong And Versatile Authentication
Products and Releases  |  2/26/2013  | 
Appliance is a full SAML v2 compliant identity provider
OneLogin Announces 12 Millionth Licensed User
Products and Releases  |  2/26/2013  | 
Cloud identity management provider reaches 700 customers
Allegro Software Announces Integrated Embedded Device Security And FIPS 140-2 Compliance
Products and Releases  |  2/26/2013  | 
Announced addition of FIPS 140-2 compliant Allegro Cryptography Engine to RomPager suite of embedded Internet toolkits
Splunk And Palo Alto Networks Join Forces To Enhance Enterprise Security Intelligence
Products and Releases  |  2/26/2013  | 
Splunk App for Palo Alto Networks 3.0 enables users to leverage big data to analyze risk, improve security posture, and compliance
Solera Networks And Ponemon Study Reveals Rise in Security Breaches, With Organizations Taking Months To Detect And Contain Them
Products and Releases  |  2/26/2013  | 
According to the majority of respondents, data breaches have increased in both severity and frequency in the past 24 months
Mandiant Launches New Threat Intelligence Offering
Products and Releases  |  2/26/2013  | 
Threat Intelligence provides customers with the analytical tools and contextual analysis to help customers better understand high priority threats
Lieberman Software Brings Compartmentalized Password Segmentation To Privileged Account Management
Products and Releases  |  2/26/2013  | 
Enterprise Random Password Manager can break up static and dynamic privileged account passwords into as many different segments as required
Tufin Survey Reveals No. 1 Use Case For Firewall Management
Products and Releases  |  2/26/2013  | 
Announces results of annual Firewall Management Survey
RSA Transforms Enterprise Authentication With Big Data-Driven Risk Analytics
Products and Releases  |  2/26/2013  | 
RSA Authentication Manager 8 analyzesf risk factors to verify and authorize end-user access to corporate or cloud-based resources
CloudLock Unveils Industry First Community Trust Rating For Google Apps
Products and Releases  |  2/26/2013  | 
CloudLock’s Community Trust Rating helps businesses evaluate which third-party applications should be granted access to employee data
Websense And Leading Technology Partners Tackle Security Challenges Of Evolving Networks
Products and Releases  |  2/26/2013  | 
Websense expands TRITON Security Alliance
CounterTack Announces Scout V3.2
Products and Releases  |  2/26/2013  | 
CounterTack Scout offers a platform for next-generation honeynet deployments
SAFECode Names Howard Schmidt Executive Director
Products and Releases  |  2/25/2013  | 
The former White House cybersecurity adviser brings to SAFECode more than 40 years of information security experience
Thales And Ponemon Institute Study Shows Encryption And Key Management Increasingly Viewed As Strategic Issues
Products and Releases  |  2/25/2013  | 
Global Encryption Trends Study shows steady increase in the deployment of encryption solutions
AlgoSec Unveils Enhanced Security Management Suite Featuring Innovative Application-Centric Policy Management
Products and Releases  |  2/25/2013  | 
New version marks the general availability of AlgoSec BusinessFlow as an integral product of the suite
RSA And Juniper Networks To Expand Technology Partnership To Address Advanced Threats And Mobile Security
Products and Releases  |  2/25/2013  | 
Juniper to embed RSA mobile authentication technologies into the Junos Pulse SSL Secure product
FireEye Platform Extends Tech To Partner
Products and Releases  |  2/25/2013  | 
Platform is formed by three core components that work in concert
Co3 Systems Delivers Security Incident Response In Major Platform Expansion
Products and Releases  |  2/25/2013  | 
Provides automated, single-pane incident management in a secure, isolated environment for general security incidents
Juniper Networks Announces Industry-First Device Level Fingerprinting
Products and Releases  |  2/25/2013  | 
Junos Spotlight Secure is cloud-based global attacker intelligence service that fingerprints hackers at the device level
Trend Micro Announces New Mobile Security For Consumers With Privacy Protection For Facebook
Products and Releases  |  2/25/2013  | 
Trend Micro Mobile Security 3.0 also includes faster malware scanning
Centrify And Samsung Partner To Deliver Industry’s First Comprehensive, Enterprise-Ready Mobile Solution For Work And Personal Use
Products and Releases  |  2/25/2013  | 
Centrify will enable multiapplication SSO for mobile and Web apps inside the Samsung KNOX container
New Research From Nominum Reveals Worst Global Cyber Threats Of 2012
Products and Releases  |  2/25/2013  | 
Majority of attacks were carried by malicious bots that were previously unknown
Akamai Raises Bar For Web Security With Enhancements To Kona Site Defender
Products and Releases  |  2/25/2013  | 
Included in the new version of Kona Site Defender are upgraded Web Application Firewall (WAF) capabilities and network layer controls
Lumension Endpoint Management Security Platform Furthers Advanced Persistent Security Offerings
Products and Releases  |  2/25/2013  | 
Company adds new features to endpoint management suite and demonstrates new mobile device management at RSA 2013 Conference
Trend Micro Steps Up Privacy Protection For Mobile Users
Products and Releases  |  2/25/2013  | 
Launching next version of Trend Micro Mobile Security for Android
RSA Launches RSA NextGen Security Operations Services To Help Customers Build Battle-Ready Cyber Defenses
Products and Releases  |  2/25/2013  | 
Escalation of cyberthreats is driving organizations to revamp their approach to prepare for, respond to, and mitigate advanced cyberthreats
Commtouch's URL Filtering Enhances Email Security For Return Path's Clients, Partners
Products and Releases  |  2/22/2013  | 
Commtouch's URLF detects compromised URLs in real time and prevents piracy of email platforms
Zscaler Delivers "Big Visibility" Security Analytics For Real-Time Insight Into Global Cloud, Web, Mobile Traffic
Products and Releases  |  2/22/2013  | 
Gives global visibility into Internet traffic across Web, email, and mobile
Commtouch Reports Fourth Quarter And Full Year 2012 Results
Products and Releases  |  2/22/2013  | 
Full year 2012 revenues totaled $23.9 million, an increase of 4.0% over 2011
Page 1 / 3   >   >>

FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...