Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in March 2013
<<   <   Page 2 / 2
Check Point Rolls Out Threat Emulation Software Blade
Products and Releases  |  3/12/2013  | 
Solution stops zero-day and unknown exploits from infecting networks
SQN Banking Systems Now Offering Cloud-Based Fraud Detection
Products and Releases  |  3/12/2013  | 
SENTRY applications will be offered as a cloud-based, SaaS model
Spam Levels Almost Double In February
Products and Releases  |  3/12/2013  | 
According to Eleven Research Team, spam volume rose by 92.2 percent compared to previous month
iPhone Gets Hardware-Based Voice Encryption
Products and Releases  |  3/12/2013  | 
Uses a MicroSD chip for encryption
SpiderOak Unveils Crypton 'Zero-Knowledge' Application Framework
Products and Releases  |  3/12/2013  | 
Crypton makes it possible to build cryptographically secure applications
Open NAC Integrates With All BYOD Solutions
Products and Releases  |  3/12/2013  | 
Bradford Networks launches Network Sentry SmartEdge Platform
Trend Micro Unveils End User Data Protection Solutions for Today's Post-PC Environments
Products and Releases  |  3/12/2013  | 
Trend Micro Enterprise Security and Data Protection mitigates risks of attacks and breaches across platforms
UBM Tech: Black Hat Europe Happening March 12-15
Products and Releases  |  3/12/2013  | 
Content includes technical Trainings and Workshops along with the most relevant, detailed, and insightful security presentations of the year
Tripwire Acquires nCircle
Products and Releases  |  3/11/2013  | 
Acquisition is expected to close in April
New Research Reveals: Consumers Crying Out For Better Personal Data Security In Call Centers
Products and Releases  |  3/11/2013  | 
Banks top the list of organizations consumers trust least with their personal data, according to an Avaya survey
GLOBO Signs U.S. And Canada Agreement With Ingram Micro And Announces Enterprise Mobility In A Box For SMBs
Products and Releases  |  3/8/2013  | 
Allows small businesses with up to 150 devices to securely run and manage their BYOD mobile workforce
AVG Technologies Announces Change To Executive Leadership Team
Products and Releases  |  3/7/2013  | 
J.R. Smith has resigned as CEO
U.S. Businesses Lack Stringent BYOD Policies
Products and Releases  |  3/7/2013  | 
ThreatMetrix releases results of 2012 State of Cybercrime study
Prolexic Mitigates DDoS Attack Against U.S. Utility Company
Products and Releases  |  3/7/2013  | 
Attackers now targeting network infrastructures that cause collateral damage
Tom Ridge, Howard Schmidt Launch New Cybersecurity Executive Services Firm
Products and Releases  |  3/6/2013  | 
Ridge Schmidt Cyber LLC will provide strategic and advisory services
SNARE SIEM Server Version 6.0 Includes a Comprehensive Query Builder And Modern Browser User Interface
Products and Releases  |  3/6/2013  | 
Allows for custom configuration of agent event log objective-setting and monitoring capabilities
Survey: Half Of Companies Have Lost A Device With Important Data
Products and Releases  |  3/6/2013  | 
According to Varonis, almost three quarters of employees are now allowed to access company data from their personal devices
Tips For ID Theft Protection During Tax Season
Products and Releases  |  3/6/2013  | 
Experian's ProtectMyID outlines ways consumers can protect themselves
Cenzic Trends Report 2013 -- 99% Of Apps Tested Have Vulnerabilities
Products and Releases  |  3/6/2013  | 
Report demonstrates overwhelming presence of Web application vulnerabilities remains a constant problem
HID Global Brings Compliant Strong Authentication To Healthcare
Products and Releases  |  3/4/2013  | 
Will showcase converged solutions and services for physical and logical access control at the HIMSS show
YooCare Announces It Has Helped to Resolve More Than 100,000 Cases Of Malware Or Virus Removal
Products and Releases  |  3/4/2013  | 
One of the most common issues that clients have needed help with is learning how to remove the FBI virus
VASCO Expands Authentication Platform
Products and Releases  |  3/4/2013  | 
Releases enhanced version of MYDIGIPASS.COM platform
Zscaler Brings Big Security Visibility To The Dloud
Products and Releases  |  3/4/2013  | 
Provides role-based access control
NSS Labs Releases Next Generation Firewall Group Test Reports
Products and Releases  |  3/4/2013  | 
NSS' research yielded several key conclusions
Raytheon Announces Collaboration With Homeland Security On Cyberthreats
Products and Releases  |  3/1/2013  | 
Raytheon will receive active, malicious cybersecurity threat information furnished by DHS
Identity Theft Is #1 Complaint Again...13 Years In A Row
Products and Releases  |  3/1/2013  | 
Of the 369,132 complaints reported in 2012 to the FTC, 46.4 percent involved issues with government documents or benefits fraud
"The Risk Of Insider Fraud" Ponemon/Attachmate Survey
Products and Releases  |  3/1/2013  | 
On average, it takes 87 days to first recognize that insider fraud has occurred, according to survey of more than 700 individuals at leading global organizations
<<   <   Page 2 / 2

Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-02-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-17963. Reason: This candidate is a reservation duplicate of CVE-2018-17963. Notes: All CVE users should reference CVE-2018-17963 instead of this candidate. All references and descriptions in this candidate have been removed to preve...
PUBLISHED: 2020-02-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
PUBLISHED: 2020-02-27
** DISPUTED ** In the GD Graphics Library (aka LibGD) through 2.2.5, there is a heap-based buffer over-read in tiffWriter in gd_tiff.c. NOTE: the vendor says &quot;In my opinion this issue should not have a CVE, since the GD and GD2 formats are documented to be 'obsolete, and should only be used for...
PUBLISHED: 2020-02-27
Synchronet BBS 3.16c for Windows allows remote attackers to cause a denial of service (service crash) via a long string in the HTTP Referer header.
PUBLISHED: 2020-02-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-1000020. Reason: This candidate is a reservation duplicate of CVE-2017-1000020. Notes: All CVE users should reference CVE-2017-1000020 instead of this candidate. All references and descriptions in this candidate have been removed to...