Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2013
<<   <   Page 2 / 2
Check Point Rolls Out Threat Emulation Software Blade
Products and Releases  |  3/12/2013  | 
Solution stops zero-day and unknown exploits from infecting networks
SQN Banking Systems Now Offering Cloud-Based Fraud Detection
Products and Releases  |  3/12/2013  | 
SENTRY applications will be offered as a cloud-based, SaaS model
Spam Levels Almost Double In February
Products and Releases  |  3/12/2013  | 
According to Eleven Research Team, spam volume rose by 92.2 percent compared to previous month
iPhone Gets Hardware-Based Voice Encryption
Products and Releases  |  3/12/2013  | 
Uses a MicroSD chip for encryption
SpiderOak Unveils Crypton 'Zero-Knowledge' Application Framework
Products and Releases  |  3/12/2013  | 
Crypton makes it possible to build cryptographically secure applications
Open NAC Integrates With All BYOD Solutions
Products and Releases  |  3/12/2013  | 
Bradford Networks launches Network Sentry SmartEdge Platform
Trend Micro Unveils End User Data Protection Solutions for Today's Post-PC Environments
Products and Releases  |  3/12/2013  | 
Trend Micro Enterprise Security and Data Protection mitigates risks of attacks and breaches across platforms
UBM Tech: Black Hat Europe Happening March 12-15
Products and Releases  |  3/12/2013  | 
Content includes technical Trainings and Workshops along with the most relevant, detailed, and insightful security presentations of the year
Tripwire Acquires nCircle
Products and Releases  |  3/11/2013  | 
Acquisition is expected to close in April
New Research Reveals: Consumers Crying Out For Better Personal Data Security In Call Centers
Products and Releases  |  3/11/2013  | 
Banks top the list of organizations consumers trust least with their personal data, according to an Avaya survey
GLOBO Signs U.S. And Canada Agreement With Ingram Micro And Announces Enterprise Mobility In A Box For SMBs
Products and Releases  |  3/8/2013  | 
Allows small businesses with up to 150 devices to securely run and manage their BYOD mobile workforce
AVG Technologies Announces Change To Executive Leadership Team
Products and Releases  |  3/7/2013  | 
J.R. Smith has resigned as CEO
U.S. Businesses Lack Stringent BYOD Policies
Products and Releases  |  3/7/2013  | 
ThreatMetrix releases results of 2012 State of Cybercrime study
Prolexic Mitigates DDoS Attack Against U.S. Utility Company
Products and Releases  |  3/7/2013  | 
Attackers now targeting network infrastructures that cause collateral damage
Tom Ridge, Howard Schmidt Launch New Cybersecurity Executive Services Firm
Products and Releases  |  3/6/2013  | 
Ridge Schmidt Cyber LLC will provide strategic and advisory services
SNARE SIEM Server Version 6.0 Includes a Comprehensive Query Builder And Modern Browser User Interface
Products and Releases  |  3/6/2013  | 
Allows for custom configuration of agent event log objective-setting and monitoring capabilities
Survey: Half Of Companies Have Lost A Device With Important Data
Products and Releases  |  3/6/2013  | 
According to Varonis, almost three quarters of employees are now allowed to access company data from their personal devices
Tips For ID Theft Protection During Tax Season
Products and Releases  |  3/6/2013  | 
Experian's ProtectMyID outlines ways consumers can protect themselves
Cenzic Trends Report 2013 -- 99% Of Apps Tested Have Vulnerabilities
Products and Releases  |  3/6/2013  | 
Report demonstrates overwhelming presence of Web application vulnerabilities remains a constant problem
HID Global Brings Compliant Strong Authentication To Healthcare
Products and Releases  |  3/4/2013  | 
Will showcase converged solutions and services for physical and logical access control at the HIMSS show
YooCare Announces It Has Helped to Resolve More Than 100,000 Cases Of Malware Or Virus Removal
Products and Releases  |  3/4/2013  | 
One of the most common issues that clients have needed help with is learning how to remove the FBI virus
VASCO Expands Authentication Platform
Products and Releases  |  3/4/2013  | 
Releases enhanced version of MYDIGIPASS.COM platform
Zscaler Brings Big Security Visibility To The Dloud
Products and Releases  |  3/4/2013  | 
Provides role-based access control
NSS Labs Releases Next Generation Firewall Group Test Reports
Products and Releases  |  3/4/2013  | 
NSS' research yielded several key conclusions
Raytheon Announces Collaboration With Homeland Security On Cyberthreats
Products and Releases  |  3/1/2013  | 
Raytheon will receive active, malicious cybersecurity threat information furnished by DHS
Identity Theft Is #1 Complaint Again...13 Years In A Row
Products and Releases  |  3/1/2013  | 
Of the 369,132 complaints reported in 2012 to the FTC, 46.4 percent involved issues with government documents or benefits fraud
"The Risk Of Insider Fraud" Ponemon/Attachmate Survey
Products and Releases  |  3/1/2013  | 
On average, it takes 87 days to first recognize that insider fraud has occurred, according to survey of more than 700 individuals at leading global organizations
<<   <   Page 2 / 2

COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft.
PUBLISHED: 2020-08-08
JetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.
PUBLISHED: 2020-08-08
In JetBrains Kotlin before 1.4.0, there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
PUBLISHED: 2020-08-08
In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges.