Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in February 2014
Page 1 / 2   >   >>
Mobile Malware Evolution: Three Infection Attempts Per User In 2013
Products and Releases  |  2/28/2014  | 
Nearly 145,000 new malicious programs for mobile devices were detected in 2013
SAS For Windows Buffer Overflow Leads To Code Execution
Products and Releases  |  2/28/2014  | 
Vulnerabilities were discovered in a routine security crash
Qualys Introduces Continuous Monitoring Cloud Service For Global Perimeters
Products and Releases  |  2/28/2014  | 
QualysGuard Cloud Platform available immediately in beta for all customers
TraceSecurity Enhances TraceCSO To Simplify IT GRC Management
Products and Releases  |  2/28/2014  | 
Customers will see improvements in key features, new functionality, and other enhanced performance metrics
Tufin Unveils Tufin Orchestration Suite Version R14-1
Products and Releases  |  2/28/2014  | 
Company also announces integration with IT automation leader Puppet Labs
Catbird Partners With Trapezoid
Products and Releases  |  2/28/2014  | 
Combined solution will leverage Trapezoid Marker to meet 24 FISMA controls
Barracuda Announces Third Quarter Fiscal 2014 Results
Products and Releases  |  2/27/2014  | 
Gross billings up 19% year-over-year to a record $77.5 million
Commtouch Completes Name Change To CYREN
Products and Releases  |  2/27/2014  | 
Company adopted new name as part of transformation into provider of cloud-based information security solutions
Napatech Unveils Network Analysis Adapter To Enhance Appliance Throughput
Products and Releases  |  2/27/2014  | 
Four-port 10 Gbps network analysis adapter provides full 40 Gbps analysis
New Verizon Cyber Intelligence Center Helps Speed Detection, Mitigation Of Cyberthreats For Enterprises, Government Agencies
Products and Releases  |  2/27/2014  | 
VCIC will provide sources of threat intelligence so enterprises can identify and respond to threats early in attack cycle
Lancope Announces New Global Secure Partner Program
Products and Releases  |  2/26/2014  | 
Program is now available in the U.S.
Netskope Survey: More Than 60 Percent Of IT's Most Security Savvy Professionals Are Either Unaware Of Their Company's Cloud App Policies Or Don't Have One
Products and Releases  |  2/26/2014  | 
In absence of cloud app policies, more than two-thirds of attendees surveyed said they would consider their company's privacy policy before downloading an app
Emulex Announces Endace Fusion Connector For Sourcefire Defense Center
Products and Releases  |  2/26/2014  | 
Connector enables streamlined access to granular network packet history
Fortinet 2014 Privacy Survey Reveals Gen-X And Millennial Attitudes Surrounding Passwords, Personal Data, Email Snooping, Online Marketing Practices
Products and Releases  |  2/26/2014  | 
Survey revealed 41% of respondents never change online passwords or only when prompted
Trend Micro Evolves Mobile Security Solutions, Elevating Capabilities for Combating Cyber Threats And Data Loss For Businesses, Consumers
Products and Releases  |  2/26/2014  | 
New solutions will help mitigate threats to mobile networks and devices
Wave Systems Begins Shipping its Management Software With Samsung Electronics' TPM Security Chips
Products and Releases  |  2/26/2014  | 
With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit
Samsung And Zscaler Announce Enterprise-Ready Mobile Security Solution
Products and Releases  |  2/26/2014  | 
Solution extends security and compliance policies from Zscaler security cloud to Samsung KNOX
nPulse Technologies Launches Cyclone Network Forensics Platform For The 10 Gig World
Products and Releases  |  2/26/2014  | 
Cyclone Network Forensics Platform includes line-rate extraction of crucial application layer security metadata
Veracode Launches Software Composition Analysis Service
Products and Releases  |  2/26/2014  | 
Integrates software composition analysis (SCA) with application security analysis in a cloud-based platform
SAFECode Releases Free Online Software Security Training Courses
Products and Releases  |  2/26/2014  | 
Courses range from preventing SQL injection to avoiding cross site request forgery
Huawei Launches Next Generation Anti-DDoS Solution At RSA Conference 2014
Products and Releases  |  2/26/2014  | 
AntiDDoS8000 series protects against application layer, mobile device, and outbound DDoS attacks
Barracuda Sees Growing Market Adoption With Security Offerings On Microsoft Windows Azure
Products and Releases  |  2/26/2014  | 
Provides firewalling and site-to-site secure remote access from on-premises networks to Windows Azure or Vnets within Windows Azure
Trend Micro Delivers Comprehensive Defense With HP Against Targeted Attacks
Products and Releases  |  2/25/2014  | 
Trend Micro Deep Discovery and HP TippingPoint will be combined
RSA Teams With Pivotal To Offer Security Analytics And Big Data Playbook
Products and Releases  |  2/25/2014  | 
New reference architecture provides actionable intelligence needed to detect security threats
RSA Conference 2014 Announces Recipients of 17th Annual Awards For Excellence In Information Security, Excellence In Public Policy & Excellence In Mathematics
Products and Releases  |  2/25/2014  | 
F. Lynn McNulty, first Director of Information Systems Security for the U.S. State Department, received Lifetime Achievement Award
AT&T And IBM Simplify Cyber Security Management
Products and Releases  |  2/25/2014  | 
New joint service will combine security network infrastructure with advanced threat monitoring and analytics
Entrust Integrates 3M Cogent Biometric Technology Into Entrust IdentityGuard Software Authentication Platform
Products and Releases  |  2/25/2014  | 
Collaboration allows organizations to leverage fingerprint biometrics to authenticate users for logical access to workstations
Tufin Survey Reveals 91% Of Security Managers Are Under Pressure To Deliver Applications And Services Faster
Products and Releases  |  2/25/2014  | 
More than three-quarters of respondents believe virtualization will have the biggest impact on security operations during next 12 to 18 months
Fortinet's FortiGuard Labs Reports 96.5% Of All Mobile Malware Tracked Is Android-Based
Products and Releases  |  2/25/2014  | 
Symbian was a distant second at 3.45 percent and iOS, BlackBerry, PalmOS, and Windows together don’t even warrant 1 percent
CA Introduces New Products For Identity And Access Management
Products and Releases  |  2/25/2014  | 
Mobility and API solutions help secure cloud, Web, and mobile applications
Cenzic Announces New Application Security Service For The Connected Enterprise
Products and Releases  |  2/25/2014  | 
Cenzic PASS allows enterprises to define the criteria for acceptably safe partner applications
Webroot Announces BrightCloud Threat Intelligence Services and Endpoint Breach Protection Solution For OEMs And Enterprises
Products and Releases  |  2/24/2014  | 
Cloud-based security offerings address increasing sophistication of online threats
AccessData Introduces Continuous, Automated Incident Resolution Platform
Products and Releases  |  2/24/2014  | 
InSight Platform enables enterprise visibility into network traffic and endpoint data, including mobile devices
CrowdStrike Inc. Partners With IBM To Launch Advanced Cyber Threat Intelligence Service
Products and Releases  |  2/24/2014  | 
Managed service planned for limited initial release in the first half of 2014
Startup BlueBox Launches, Rolls Out New Approach To BYOD Security Problem
Products and Releases  |  2/24/2014  | 
Bluebox SaaS mobile data security solution delivers visibility of corporate data as it moves throughout the mobile workflow
IBM Announces Security Forensics Capabilities To Help Protect Critical Data
Products and Releases  |  2/24/2014  | 
IBM Security QRadar Incident Forensics designed as a module for the QRadar Security Intelligence Platform
McAfee Announces New Product That Stops Advanced Threats In Milliseconds
Products and Releases  |  2/24/2014  | 
At the core of McAfee Threat Intelligence Exchange is a new virtual appliance that connects multiple enterprise security platforms
Removing Admin Rights Mitigates 92% Of Critical Microsoft Vulnerabilities
Products and Releases  |  2/21/2014  | 
New analysis of Patch Tuesday bulletins shows benefits of stripping admin rights
IID Launches ActiveTrust Cyber Threat Sharing And Collaboration Network
Products and Releases  |  2/21/2014  | 
Dozens of Major Enterprises and Government Agencies Quickly Adopt Platform to Control and Coordinate the Latest Cybersecurity Intelligence
Cylance Announces $20 Million in Series B Funding
Products and Releases  |  2/21/2014  | 
Blackstone, Khosla Ventures, Fairhaven Capital and Private Investors Accelerate Cylance's Growth and Advanced Mathematics Platform
ThreatTrack Security Introduces Automated APT Remediation
Products and Releases  |  2/21/2014  | 
New ThreatSecure platform generates custom remediation signatures for newly discovered malware threats, including APTs, targeted attacks and zero-days
Ionic Security Secures $25.5 Million in Series B Funding
Products and Releases  |  2/21/2014  | 
Co-Lead by Google Ventures and Jafco, Leading Security Startup Prepares to Disrupt Traditional Perimeter Security
Deloitte Launches Secure.Vigilant.Resilient
Products and Releases  |  2/21/2014  | 
New approach to cyber risk to help complex organizations reap benefits of growth and innovation
Proofpoint Adds Next-Generation Predictive Defense To Targeted Attack Protection Solution
Products and Releases  |  2/21/2014  | 
Protects users from malware and advanced threats in both URLs and email attachments
Pindrop Security Launches Combined Voice Biometric and Phoneprinting Fraud Detection System
Products and Releases  |  2/20/2014  | 
New Level of Authentication Improves Phone Fraud Detection Capabilities
FireEye Announces Threat Analytics Capabilities for the FireEye Security Platform
Products and Releases  |  2/20/2014  | 
Cloud-based solution enables security teams to identify attacks and accelerate incident response by correlating security event data with FireEye Real-Time Threat Intelligence
Okta Delivers New Identity Offerings to Power Cloud-Based Services
Products and Releases  |  2/20/2014  | 
Jive Software and Advent Software Among Cloud Service Providers Using Okta to Address Range of Identity-Related Needs for Innovative Cloud Offerings
CyberArk Launches Enhanced CyberArk DNA to Detect Pass-the-Hash Vulnerabilities
Products and Releases  |  2/19/2014  | 
Discovery and Audit Tool to Identify and Map Exposed Password Hashes and Vulnerable Machines on a Network; Free Trial Available for Limited Time
AlgoSec Partners With Qualys
Products and Releases  |  2/19/2014  | 
New Integration Delivers Application-Centric Vulnerability Management, Aggregating and Scoring Vulnerabilities Based on Risk and Continuously Monitoring for Changes within Data Center Environments
SANS-Norse Cyberthreat Report Reveals that Cyberattacks Are Causing an Epidemic of Compromises at Healthcare Organizations
Products and Releases  |  2/19/2014  | 
Norse Global Threat Intelligence Platform Identifies Healthcare Organizations' Compromised Networks, Applications, Devices and Systems
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15488
PUBLISHED: 2020-09-30
Re:Desk 2.3 allows insecure file upload.
CVE-2020-15849
PUBLISHED: 2020-09-30
Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application's database, allowing for a...
CVE-2020-14375
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated ...
CVE-2020-14376
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system...
CVE-2020-14377
PUBLISHED: 2020-09-30
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attack...