Products and Releases

Content posted in February 2014
Page 1 / 2   >   >>
Mobile Malware Evolution: Three Infection Attempts Per User In 2013
Products and Releases  |  2/28/2014  | 
Nearly 145,000 new malicious programs for mobile devices were detected in 2013
SAS For Windows Buffer Overflow Leads To Code Execution
Products and Releases  |  2/28/2014  | 
Vulnerabilities were discovered in a routine security crash
Qualys Introduces Continuous Monitoring Cloud Service For Global Perimeters
Products and Releases  |  2/28/2014  | 
QualysGuard Cloud Platform available immediately in beta for all customers
TraceSecurity Enhances TraceCSO To Simplify IT GRC Management
Products and Releases  |  2/28/2014  | 
Customers will see improvements in key features, new functionality, and other enhanced performance metrics
Tufin Unveils Tufin Orchestration Suite Version R14-1
Products and Releases  |  2/28/2014  | 
Company also announces integration with IT automation leader Puppet Labs
Catbird Partners With Trapezoid
Products and Releases  |  2/28/2014  | 
Combined solution will leverage Trapezoid Marker to meet 24 FISMA controls
Barracuda Announces Third Quarter Fiscal 2014 Results
Products and Releases  |  2/27/2014  | 
Gross billings up 19% year-over-year to a record $77.5 million
Commtouch Completes Name Change To CYREN
Products and Releases  |  2/27/2014  | 
Company adopted new name as part of transformation into provider of cloud-based information security solutions
Napatech Unveils Network Analysis Adapter To Enhance Appliance Throughput
Products and Releases  |  2/27/2014  | 
Four-port 10 Gbps network analysis adapter provides full 40 Gbps analysis
New Verizon Cyber Intelligence Center Helps Speed Detection, Mitigation Of Cyberthreats For Enterprises, Government Agencies
Products and Releases  |  2/27/2014  | 
VCIC will provide sources of threat intelligence so enterprises can identify and respond to threats early in attack cycle
Lancope Announces New Global Secure Partner Program
Products and Releases  |  2/26/2014  | 
Program is now available in the U.S.
Netskope Survey: More Than 60 Percent Of IT's Most Security Savvy Professionals Are Either Unaware Of Their Company's Cloud App Policies Or Don't Have One
Products and Releases  |  2/26/2014  | 
In absence of cloud app policies, more than two-thirds of attendees surveyed said they would consider their company's privacy policy before downloading an app
Emulex Announces Endace Fusion Connector For Sourcefire Defense Center
Products and Releases  |  2/26/2014  | 
Connector enables streamlined access to granular network packet history
Fortinet 2014 Privacy Survey Reveals Gen-X And Millennial Attitudes Surrounding Passwords, Personal Data, Email Snooping, Online Marketing Practices
Products and Releases  |  2/26/2014  | 
Survey revealed 41% of respondents never change online passwords or only when prompted
Trend Micro Evolves Mobile Security Solutions, Elevating Capabilities for Combating Cyber Threats And Data Loss For Businesses, Consumers
Products and Releases  |  2/26/2014  | 
New solutions will help mitigate threats to mobile networks and devices
Wave Systems Begins Shipping its Management Software With Samsung Electronics' TPM Security Chips
Products and Releases  |  2/26/2014  | 
With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit
Samsung And Zscaler Announce Enterprise-Ready Mobile Security Solution
Products and Releases  |  2/26/2014  | 
Solution extends security and compliance policies from Zscaler security cloud to Samsung KNOX
nPulse Technologies Launches Cyclone Network Forensics Platform For The 10 Gig World
Products and Releases  |  2/26/2014  | 
Cyclone Network Forensics Platform includes line-rate extraction of crucial application layer security metadata
Veracode Launches Software Composition Analysis Service
Products and Releases  |  2/26/2014  | 
Integrates software composition analysis (SCA) with application security analysis in a cloud-based platform
SAFECode Releases Free Online Software Security Training Courses
Products and Releases  |  2/26/2014  | 
Courses range from preventing SQL injection to avoiding cross site request forgery
Huawei Launches Next Generation Anti-DDoS Solution At RSA Conference 2014
Products and Releases  |  2/26/2014  | 
AntiDDoS8000 series protects against application layer, mobile device, and outbound DDoS attacks
Barracuda Sees Growing Market Adoption With Security Offerings On Microsoft Windows Azure
Products and Releases  |  2/26/2014  | 
Provides firewalling and site-to-site secure remote access from on-premises networks to Windows Azure or Vnets within Windows Azure
Trend Micro Delivers Comprehensive Defense With HP Against Targeted Attacks
Products and Releases  |  2/25/2014  | 
Trend Micro Deep Discovery and HP TippingPoint will be combined
RSA Teams With Pivotal To Offer Security Analytics And Big Data Playbook
Products and Releases  |  2/25/2014  | 
New reference architecture provides actionable intelligence needed to detect security threats
RSA Conference 2014 Announces Recipients of 17th Annual Awards For Excellence In Information Security, Excellence In Public Policy & Excellence In Mathematics
Products and Releases  |  2/25/2014  | 
F. Lynn McNulty, first Director of Information Systems Security for the U.S. State Department, received Lifetime Achievement Award
AT&T And IBM Simplify Cyber Security Management
Products and Releases  |  2/25/2014  | 
New joint service will combine security network infrastructure with advanced threat monitoring and analytics
Entrust Integrates 3M Cogent Biometric Technology Into Entrust IdentityGuard Software Authentication Platform
Products and Releases  |  2/25/2014  | 
Collaboration allows organizations to leverage fingerprint biometrics to authenticate users for logical access to workstations
Tufin Survey Reveals 91% Of Security Managers Are Under Pressure To Deliver Applications And Services Faster
Products and Releases  |  2/25/2014  | 
More than three-quarters of respondents believe virtualization will have the biggest impact on security operations during next 12 to 18 months
Fortinet's FortiGuard Labs Reports 96.5% Of All Mobile Malware Tracked Is Android-Based
Products and Releases  |  2/25/2014  | 
Symbian was a distant second at 3.45 percent and iOS, BlackBerry, PalmOS, and Windows together don’t even warrant 1 percent
CA Introduces New Products For Identity And Access Management
Products and Releases  |  2/25/2014  | 
Mobility and API solutions help secure cloud, Web, and mobile applications
Cenzic Announces New Application Security Service For The Connected Enterprise
Products and Releases  |  2/25/2014  | 
Cenzic PASS allows enterprises to define the criteria for acceptably safe partner applications
Webroot Announces BrightCloud Threat Intelligence Services and Endpoint Breach Protection Solution For OEMs And Enterprises
Products and Releases  |  2/24/2014  | 
Cloud-based security offerings address increasing sophistication of online threats
AccessData Introduces Continuous, Automated Incident Resolution Platform
Products and Releases  |  2/24/2014  | 
InSight Platform enables enterprise visibility into network traffic and endpoint data, including mobile devices
CrowdStrike Inc. Partners With IBM To Launch Advanced Cyber Threat Intelligence Service
Products and Releases  |  2/24/2014  | 
Managed service planned for limited initial release in the first half of 2014
Startup BlueBox Launches, Rolls Out New Approach To BYOD Security Problem
Products and Releases  |  2/24/2014  | 
Bluebox SaaS mobile data security solution delivers visibility of corporate data as it moves throughout the mobile workflow
IBM Announces Security Forensics Capabilities To Help Protect Critical Data
Products and Releases  |  2/24/2014  | 
IBM Security QRadar Incident Forensics designed as a module for the QRadar Security Intelligence Platform
McAfee Announces New Product That Stops Advanced Threats In Milliseconds
Products and Releases  |  2/24/2014  | 
At the core of McAfee Threat Intelligence Exchange is a new virtual appliance that connects multiple enterprise security platforms
Removing Admin Rights Mitigates 92% Of Critical Microsoft Vulnerabilities
Products and Releases  |  2/21/2014  | 
New analysis of Patch Tuesday bulletins shows benefits of stripping admin rights
IID Launches ActiveTrust Cyber Threat Sharing And Collaboration Network
Products and Releases  |  2/21/2014  | 
Dozens of Major Enterprises and Government Agencies Quickly Adopt Platform to Control and Coordinate the Latest Cybersecurity Intelligence
Cylance Announces $20 Million in Series B Funding
Products and Releases  |  2/21/2014  | 
Blackstone, Khosla Ventures, Fairhaven Capital and Private Investors Accelerate Cylance's Growth and Advanced Mathematics Platform
ThreatTrack Security Introduces Automated APT Remediation
Products and Releases  |  2/21/2014  | 
New ThreatSecure platform generates custom remediation signatures for newly discovered malware threats, including APTs, targeted attacks and zero-days
Ionic Security Secures $25.5 Million in Series B Funding
Products and Releases  |  2/21/2014  | 
Co-Lead by Google Ventures and Jafco, Leading Security Startup Prepares to Disrupt Traditional Perimeter Security
Deloitte Launches Secure.Vigilant.Resilient
Products and Releases  |  2/21/2014  | 
New approach to cyber risk to help complex organizations reap benefits of growth and innovation
Proofpoint Adds Next-Generation Predictive Defense To Targeted Attack Protection Solution
Products and Releases  |  2/21/2014  | 
Protects users from malware and advanced threats in both URLs and email attachments
Pindrop Security Launches Combined Voice Biometric and Phoneprinting Fraud Detection System
Products and Releases  |  2/20/2014  | 
New Level of Authentication Improves Phone Fraud Detection Capabilities
FireEye Announces Threat Analytics Capabilities for the FireEye Security Platform
Products and Releases  |  2/20/2014  | 
Cloud-based solution enables security teams to identify attacks and accelerate incident response by correlating security event data with FireEye Real-Time Threat Intelligence
Okta Delivers New Identity Offerings to Power Cloud-Based Services
Products and Releases  |  2/20/2014  | 
Jive Software and Advent Software Among Cloud Service Providers Using Okta to Address Range of Identity-Related Needs for Innovative Cloud Offerings
CyberArk Launches Enhanced CyberArk DNA to Detect Pass-the-Hash Vulnerabilities
Products and Releases  |  2/19/2014  | 
Discovery and Audit Tool to Identify and Map Exposed Password Hashes and Vulnerable Machines on a Network; Free Trial Available for Limited Time
AlgoSec Partners With Qualys
Products and Releases  |  2/19/2014  | 
New Integration Delivers Application-Centric Vulnerability Management, Aggregating and Scoring Vulnerabilities Based on Risk and Continuously Monitoring for Changes within Data Center Environments
SANS-Norse Cyberthreat Report Reveals that Cyberattacks Are Causing an Epidemic of Compromises at Healthcare Organizations
Products and Releases  |  2/19/2014  | 
Norse Global Threat Intelligence Platform Identifies Healthcare Organizations' Compromised Networks, Applications, Devices and Systems
Page 1 / 2   >   >>


Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.