Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2010
<<   <   Page 4 / 4
DoD Adds Ethical Hacker Certification Program
Products and Releases  |  3/1/2010  | 
CEH is now formally integrated into the certification requirements for U.S. DoD IA Workforce
Damballa Terminates Botnets and Crimeware Threats That Compromise Fortune 1000 Enterprises
Products and Releases  |  3/1/2010  | 
New technology severs communications to and from botnets and advanced persistent threat controllers in real-time
Radiant Logic Extends Identity & Context Virtualization With Release Of RadiantOne Suite 5.2
Products and Releases  |  3/1/2010  | 
Suite consists of Virtual Directory Server (VDS) Context Edition 5.2 and Identity and Correlation Server (ICS) 5.2
Lieberman Software Extends Privileged Identity Management To Cloud Infrastructure
Products and Releases  |  3/1/2010  | 
ERPM continuously discovers, secures, and grants fully audited, role-based administrative access to physical and virtual IT assets within the cloud infrastructure
Industry Leaders Harness Sophos To Power Security Products And Services
Products and Releases  |  3/1/2010  | 
Sophos partners maximize protection for Web 2.0 applications, virtualized environments, and more
GlobalSign Releases Code Signing Certificates For Individual Software Developers
Products and Releases  |  3/1/2010  | 
GlobalSign Code Signing Certificates support many popular developer platforms
BlockMaster And CryptoCard Offer Authentication On-Demand Over The Internet
Products and Releases  |  3/1/2010  | 
BlockMaster partner CryptoCard has integrated its BlackShield ID tokens with SafeStick to provide two-factor authentication
Industrialized Cyberattacks Infect Educational Servers Worldwide
Products and Releases  |  3/1/2010  | 
Imperva report warns that hackers have become industrialized and represent an exponentially increased threat to individuals, organizations and government
Survey By IEEE, Cloud Security Alliance Details Importance And Urgency Of Cloud Computing Security Standards
Products and Releases  |  3/1/2010  | 
Enterprises eager to adopt cloud computing, but regulatory requirements demand security standards compliance
Netronome Announces First SSL Inspection Appliance For 10 Gbps Networks
Products and Releases  |  3/1/2010  | 
SSL Inspector Appliance patches critical hole in Internet security architecture, eliminating blind spot in enterprise compliance caused by encryption
BeyondTrust Announces Privilege Manager 4.7
Products and Releases  |  3/1/2010  | 
Privilege Manager 4.7 make it easier to migrate to Windows 7 and maintain recommended security configurations
TriCipher myOneLogin SignatureBook Offers Digital Signatures On-Demand
Products and Releases  |  3/1/2010  | 
TriCipher offers hosted version of digital signing solution
CertiVox Launches Web 2.0 Security Service
Products and Releases  |  3/1/2010  | 
Solutions enables anyone to protect, deliver, track, control and monetize their valuable documents and media
Avenda Announces New Identity-Aware Network Security Solution
Products and Releases  |  3/1/2010  | 
eTIPS 3.0 comprises a virtual appliance offering for the data center and a remote access authentication gateway
Thales And Ponemon Institute PCI DSS Survey Reveals That Encryption Is Most Effective Means For End-to-End Protection
Products and Releases  |  3/1/2010  | 
Survey of Qualified Security Assessors (QSAs) reveals new information on how merchants are coping with compliance and spending on annual compliance assessments
SRA Presents One Vault Voice For Secure BlackBerry Smartphones
Products and Releases  |  3/1/2010  | 
One Vault Voice combines SRA's application for BlackBerry smartphones, management system, and authentication server with KoolSpan's TrustChip hardened encryption module
EMC Expands Security Consulting Services
Products and Releases  |  3/1/2010  | 
RSA Security Practice of EMC Consulting to help organizations meet industry standards and compliance regulations
SafeNet Solutions Secure Cloud Computing Deployments
Products and Releases  |  3/1/2010  | 
SafeNet offers three new data-centric security solutions to protect data in the cloud
nCircle Announces Self-Service Security and Compliance Portal, Enhanced Auditing Of Virtualized Environments
Products and Releases  |  3/1/2010  | 
Expanded self-service reporting portal proves security and compliance investment value
FoxT Announces Availability of BoKS Access Control For Servers To Secure Access To Amazon EC2 Cloud
Products and Releases  |  3/1/2010  | 
BoKS solution provides the ability to securely authorize access to root and other functional account privileges across servers in both physical and virtual environments
PFU Systems Debuts Affordable Network Access Control Solution
Products and Releases  |  3/1/2010  | 
iNetSec Inspection Center V6.0 for VMware keeps networks secure from external threats and internal breaches
Qualys Introduces GO SECURE Service For Businesses To Scan Web Sites For Malware, Vulnerabilities
Products and Releases  |  3/1/2010  | 
Qualys SECURE seal demonstrates web sites are following rigorous security testing procedures on a regular basis
<<   <   Page 4 / 4

NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping bec...
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ...
PUBLISHED: 2021-01-21
OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attacker...
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the...
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192427.