Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2013
<<   <   Page 2 / 3   >   >>
Alert Logic Releases New Log Manager To Integrate All Customer Environments
Products and Releases  |  2/22/2013  | 
New Log Manager allows users to manage log data from all of their infrastructure
Anonymous Attacks US State Department Careers Website: Analysis
Products and Releases  |  2/22/2013  | 
Attack appears to be a SQL Injection
TraceSecurity Customers Realize Automated Compliance And Cost-Savings Benefits With Cloud-based TraceCSO IT GRC
Products and Releases  |  2/22/2013  | 
Solution will be publicly demonstrated for the first time at the RSA Conference 2013
SecureAuth Issued Two Patents For User Authentication Methods
Products and Releases  |  2/22/2013  | 
Patents expand BYOD identity/access management
AVG Reports Fourth Quarter And Fiscal Year 2012 Financial Results
Products and Releases  |  2/22/2013  | 
Revenue for the fourth quarter of 2012 was $95.2 million, an increase of 28 percent over 2011
OneID Delivers Online Shoppers Safely to the Front Of The Checkout Line In A Single Click With OneID QuickFill
Products and Releases  |  2/22/2013  | 
Chrome browser extension lets users create and store their personal identities encrypted in a secure cloud
Stormpath Closes $8.2 Million Series A Financing To Deliver Easy User Management For Developers
Products and Releases  |  2/22/2013  | 
New Enterprise Associates and Pelion Venture Partners led the round
Qualys Announces Partnership With Cloud-Based Pen Tester iViZ
Products and Releases  |  2/21/2013  | 
Qualys will combine its QualysGuard Web Application Scanning with iViZ’s Penetration Testing technology
FireMon Expands Situational Awareness With Security Manager 7.0
Products and Releases  |  2/21/2013  | 
Security Manager 7.0 comes with a set of predefined assessments
'Police Virus' Infections On The Rise, Reports PandaLabs
Products and Releases  |  2/21/2013  | 
Malware continues to infect thousands of computers around the world
nCircle Releases Vulnerability Scan App For Apple iDevices
Products and Releases  |  2/21/2013  | 
nCircle Remote allows users to start, monitor, and view the results of IP360 vulnerability scans with their iPhone or iPad
General Dynamics New High-Speed Encryptors Now NSA Certified
Products and Releases  |  2/21/2013  | 
New encryptors can secure and store classified files equal to a Blu-ray disk full of data in less than 6 seconds
Symplified IDaaS Survey Findings
Products and Releases  |  2/21/2013  | 
The average organization now manages up to 50 on-premises applications -- two times the number of cloud-based applications currently managed
Barracuda Networks And Drobo Partner to Provide Ubiquitous Data Access For Drobo Users With Barracuda Networks Copy
Products and Releases  |  2/21/2013  | 
Drobo 5N will be integrated with Copy, a Barracuda Service
TraceSecurity ACloud-based IT GRC Solution To SMEs And SMBs
Products and Releases  |  2/21/2013  | 
TraceCSO delivers comprehensive visibility and accountability for improved risk and compliance profiles
Silent Circle Adds Encrypted Attachment Support To Silent Text
Products and Releases  |  2/21/2013  | 
Silent Text app provides peer-to-peer message encryption between iOS devices
PhishMe Unveils New Features To Address APT At RSA 2013
Products and Releases  |  2/21/2013  | 
Additions include PhishMe's Highly Visible Targets Identifier, Benchmarking, and a new simulation type, the Double Barrel
ESET Secure Authentication: New Two-Factor Authentication (2FA) System Protects Passwords And Prevents Data Breaches
Products and Releases  |  2/21/2013  | 
Application makes use of remote end-users' mobile devices to deliver a one-time password
Entrust Tops 4-Year Financial, Business Goals Under Thoma Bravo Ownership
Products and Releases  |  2/21/2013  | 
Entrust has grown total and product revenue every year since being acquired by Thoma Bravo in 2009
IBM Takes On Security For iOS Enterprise Apps
Products and Releases  |  2/21/2013  | 
IBM AppScan Source 8.7 for iOS builds security analysis early into the development cycle
iScan Online Announces Android App For Mobile Security Scanning
Products and Releases  |  2/20/2013  | 
iScan Online solution is designed to scan thousands of devices simultaneously
Barracuda Networks Launches Ultimate File Sharing, Sync And Storage Service Based On Secure Global Barracuda Cloud
Products and Releases  |  2/20/2013  | 
Copy allows users to securely access, share and sync files from anywhere, and from any device
Healthcare Industry Announces Working Group To Support Cybersecurity Executive Order For Critical Infrastructure Protection
Products and Releases  |  2/20/2013  | 
Group brings CISOs of the nations' largest healthcare organizations together with DHS, DHHS
nCircle IP360 Utilizes Customizable, Python-Based Vulnerability Rules
Products and Releases  |  2/20/2013  | 
New tools augment nCircle’s existing Advance Security Programming Language
Lockheed Martin and Fixmo Offer Secure Gesture Mobile Authentication
Products and Releases  |  2/20/2013  | 
Integrated technologies provide secure authentication for consumer-grade mobile devices
Trusteer Apex Protects Enterprise Endpoint Apps With Exploit Prevention Technology
Products and Releases  |  2/20/2013  | 
Product prevents the exploitation of zero-day or unpatched application vulnerabilities
Duo Security Launches Secure Mobile ID
Products and Releases  |  2/20/2013  | 
Offers two-factor authentication service
6 Tips To Overcome PHI Security Obstacles
Products and Releases  |  2/20/2013  | 
Industry experts presenting at the PHI Protection forum offer six tips
Wombat Launches SmishGuru to Protect Today's BYOD Workforce Against Text Message Phishing Attacks
Products and Releases  |  2/20/2013  | 
Attack simulation service protects corporate networks from malware, spyware, and other malicious software
WhiteHat Security Receives $31 Million Strategic Growth Investment From Leading Investment Firms
Products and Releases  |  2/20/2013  | 
WhiteHat secures the Web applications of some of the largest worldwide brands
F5 BYOD 2.0 Solution Empowers Workers To Merge Productivity And Lifestyle
Products and Releases  |  2/19/2013  | 
Mobile App Manager combines the policy management and secure application delivery
Symantec 2013 State Of Mobility Survey Finds Differences Between Innovative And Traditional Companies
Products and Releases  |  2/19/2013  | 
The two groups perceive the benefits and risks of mobility differently, according to the survey
Coverity Expands Global Footprint
Products and Releases  |  2/15/2013  | 
Announces the opening of four new offices
IEEE Comp. Society Experts Say CALEA Will Weaken U.S. Comm Infrastructure
Products and Releases  |  2/15/2013  | 
Experts argue that there are viable alternatives to the FBI expanding the Communications Assistance for Law Enforcement Act
Huawei Applauds U.S. Executive Order Calling Enhanced Collaboration And Standards To Address Cybersecurity
Products and Releases  |  2/15/2013  | 
Initiatives are in line with Huawei's focus on standard-setting
New HIPAA Omnibus Rule Changes Health IT Security Landscape
Products and Releases  |  2/15/2013  | 
Rule means more audits and increased penalties if compliance is not achieved
Business Roundtable Endorses Bipartisan Cybersecurity Legislation
Products and Releases  |  2/14/2013  | 
"Missing piece of effective cybersecurity is robust, two-way information sharing, with appropriate legal and privacy protections, between business and government," said Business Roundtable President John Engler
New Social Sharing Tool From Veracode
Products and Releases  |  2/13/2013  | 
SmartShare offer developers, bloggers and marketers a more secure method of on-site bookmark sharing
Redspin Issues Assessment Of Current Healthcare IT Security Safeguards
Products and Releases  |  2/13/2013  | 
Company releases annual breach report of protected health information
Vulnerabilities In Mobile And Modern Web Applications Now Detectable With NTOSpider 6.0
Products and Releases  |  2/13/2013  | 
Web application scanner lets security teams automatically crawl, interpret, and scan modern application technologies
Intego Introduces New Mac Security Software
Products and Releases  |  2/13/2013  | 
Intego Mac Internet Security Premium 2013 bundle includes Virus Barrier 2013, Net Barrier 2013, and Identity Scrubber
CyberHive Launches Security-Specific Incubator In San Diego
Products and Releases  |  2/13/2013  | 
Select firms will receive up to $200,000 in start-up capital in addition to business and research mentoring
New Xerox Software System Creates Simpler, Secure Workflow-Supports Cloud, Custom Apps, BYOD
Products and Releases  |  2/13/2013  | 
ConnectKey is a software system embedded in Xerox multifunction printers
Low Merchant PCI Compliance Rates Blamed On Dated Technology
Products and Releases  |  2/13/2013  | 
PCI vendor calls for acquirer/ISO PCI program technology updates to meet merchant needs
National Institute Of Standards And Technology Initiates Development Of New Cybersecurity Framework
Products and Releases  |  2/13/2013  | 
Framework will be a set of voluntary standards and best practices to guide industry in reducing cyber-risks
Cylance Announces $15M In Funding
Products and Releases  |  2/13/2013  | 
Cylance is also announcing its board members and board of advisers
Wave Announces New Windows 8 Tablet Security Offering For Enterprises
Products and Releases  |  2/12/2013  | 
Eliminates need for mobile device management
Sophos Extends UTM To The Enterprise
Products and Releases  |  2/12/2013  | 
Sophos RED 50 centrally manages UTM for midsize branch offices
U.S. Is Spam World Champion
Products and Releases  |  2/12/2013  | 
One in 60 e-mails contained malware in January
CA Technologies Announces CA CloudMinder - IAM As-A-Service
Products and Releases  |  2/12/2013  | 
Three components of CA CloudMinder can be deployed individually or together in a single, integrated IAM service
<<   <   Page 2 / 3   >   >>


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19040
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '&quot;sampling&quot;:{&quot;value&quot;:&quot;&lt;script&gt;' substring.
CVE-2019-19041
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.