Products and Releases

Content posted in April 2014
Page 1 / 2   >   >>
Imperva Advances Protection Against Data Breaches
Products and Releases  |  4/30/2014  | 
Proactive Controls Close Massive Security Gaps Caused by IT Complexity
Study: Sensitive Info Is 'Readable In Cloud
Products and Releases  |  4/30/2014  | 
Annual global survey from Thales reveals widespread uncertainty about cloud security and negative impacts on security posture.
Foresight Launches Defacement Mitigator for Cyber-Security Protection
Products and Releases  |  4/30/2014  | 
Solution Rapidly Addresses Online "Hacktivism"
Criminal network involved in payment card fraud dismantled with INTERPOL support
Products and Releases  |  4/30/2014  | 
INTERPOL assisted information exchange among investigators worldwide in USD 45 million theft
F-Secure Releases First Quarter Mobile Threat Report
Products and Releases  |  4/30/2014  | 
Nearly all new mobile threats in Q1 2014 targeted Android users, and cybercriminals continued to innovate with a list of first-ever threats on the platform
To Address Global Cybersecurity Skills Crisis, ISACA Unveils Comprehensive Cybersecurity Nexus Program
Products and Releases  |  4/30/2014  | 
One in five businesses has experienced an APT attack, yet 62% of enterprises are not increasing security training in 2014
Onapsis Inc. Announces Its Inclusion in the SAP PartnerEdge Program and Onapsis X1 Now Available on SAP Store
Products and Releases  |  4/30/2014  | 
Certified to integrate with the SAP NetWeaver platform
Target Appoints New Chief Information Officer, Outlines Updates on Security Enhancements
Products and Releases  |  4/29/2014  | 
Company plans to enable REDcard portfolio with MasterCard chip-and-PIN technology
Report: Financial Firms Voice Concerns About 3rd Party 'Privileged User' Creds
Products and Releases  |  4/29/2014  | 
55 percent of European financial organisations believe third party contractors pose the biggest risk; 52 percent find insider threats harder to detect than last year
Courion survey: IT security execs have breach anxiety
Products and Releases  |  4/29/2014  | 
Management of Access Privileges Cited as Critical to Reducing Risk and Increasing Security.
New DDoS Stats: NTP Used in 56% of Large Attacks
Products and Releases  |  4/29/2014  | 
4.4% of Websites With SSL and 8.7% of Android Devices With SSL Libraries Are Still Vulnerable
Products and Releases  |  4/25/2014  | 
What's left of the Heartbleed in SSL-based websites and mobile apps
Authentic8 Enhances Silo for Heartbleed
Products and Releases  |  4/24/2014  | 
Silo users will now benefit from automatic monitoring of their web accounts to protect personal information from being compromised via Heartbleed.
SecureAuth IdP Qualifies For Microsoft Office 365 Qualification
Products and Releases  |  4/23/2014  | 
Successfully Implements the Widely Used WS Federation/WS-Trust Identity Standard to Provide a Single Sign-on and Attribute Exchange Framework
NIST Removes Cryptography Algorithm from Random Number Generator Recommendations
Products and Releases  |  4/22/2014  | 
September 2013, news reports prompted public concern about the trustworthiness of Dual_EC_DRBG. As a result, NIST immediately recommended against the use of the algorithm and reissued SP 800-90A for public comment.
Black Lotus Threat Report Predicts New DrDoS Attacks in Excess of 800 Gbps in 2015
Products and Releases  |  4/22/2014  | 
Service providers, carriers must strengthen security to protect operations during next 12 to 18 months
Cloud Control: Launch of Entrust IdentityGuard Cloud Services Simplifies Certificate Management, Credentialing
Products and Releases  |  4/22/2014  | 
New cloud-based console simplifies management of SSL, PKI, certificate discovery, device certificates and credentialing
Verizon Expands Cloud Solutions, With Secure Cloud Interconnect
Products and Releases  |  4/22/2014  | 
Organizations can now use private IP to securely connect multi-cloud environments around the globe
Mocana Calls Heartbleed a Wake-Up Call for Makers of Smart Connected Devices
Products and Releases  |  4/22/2014  | 
Properly protecting the Internet of Things will require changes from business as usual
HID Global Security Survey and Infographic Reveal Attitudes about Best Practices for Physical Access Control
Products and Releases  |  4/22/2014  | 
Significant majority of survey respondents acknowledge importance of top technology and policy best practices, yet far fewer say they are implementing them well or at all.
Cisco Launches Managed Threat Defense Service
Products and Releases  |  4/22/2014  | 
Solution Helps Defends Against Known Intrusions, Protect from Unknown Attacks and Guard Against Advanced Persistent Threats.
Belden Rolls Out Advanced Cyber Security Toolkit
Products and Releases  |  4/22/2014  | 
New Tofino Enforcer Software Development Kit Brings Next Generation Security to SCADA Networks
Total Defense Announces Merger of Consumer Business and Launches Stand-alone Corporate Cloud Business
Products and Releases  |  4/21/2014  | 
Provider of Internet Security Solutions Merges Consumer Business Line with Untangle; Rebrands Enterprise Business as iSheriff
Trend Micro Enhances User Protection Solution
Products and Releases  |  4/21/2014  | 
Provides simple, comprehensive security across endpoints using cloud, hybrid or on-premise deployment
Study finds 52% of enterprises defenseless against cyber attacks
Products and Releases  |  4/17/2014  | 
New report highlights need for layered endpoint security strategy.
Cryptzone Survey Reveals SharePoint Users are Breaching Security Policies
Products and Releases  |  4/17/2014  | 
With administrators the worst perpetrators perceiving their permission as unrestricted
Understanding Risk from Business Perspective Is Top Concern for Network Security Organizations
Products and Releases  |  4/17/2014  | 
Majority of AlgoSec survey respondents feel that business stakeholders need to own the risk of their data center applications
New Survey: Half of IT Professionals Make Undocumented Changes to IT Systems
Products and Releases  |  4/17/2014  | 
Just 60% of Organizations have Change Management Controls in Place, Leaving 40% at Risk from Security Threats or System Downtime
SMS PASSCODE Announces North America Launch
Products and Releases  |  4/16/2014  | 
Industry Veteran Henrik Jeberg Joins Team to Manage and Grow SMS
New Osterman Research Report: Only 13% Happy With Compliance Methods
Products and Releases  |  4/16/2014  | 
Burdensome Compliance Management Processes are Eating Into IT Budget
Sophos Boosts Network Security with New Hardware Appliances
Products and Releases  |  4/16/2014  | 
SG Series Utilizes New Intel Core Processors to Accelerate Sophos UTM and Next-Gen Firewall Solutions
More Than Half of Organizations Filter Out Negative Facts Before Communicating Security Risk to C-Level Executives
Products and Releases  |  4/16/2014  | 
New Ponemon Study, Sponsored by FireMon, Finds Massive Overconfidence in Enterprise Security Strength; Ineffective Communications, Inability to Measure and Accommodate Change Drive Substantial Risk.
AlienVault Announces Beta Version of Open Threat Exchange 2.0
Products and Releases  |  4/14/2014  | 
Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000 participants and more than 1 million threat indicators daily
Survey: As Companies Move to the Cloud, Increased Security is their Biggest IT Concern
Products and Releases  |  4/14/2014  | 
Autotask Survey also Details IT Hiring Plans, Billing Rates and What's Driving Demand for IT Services
Future of Open Source Survey: OSS Powering New Technologies, Creating New Economics
Products and Releases  |  4/14/2014  | 
Open source is enjoying a proliferation that starts with a growing number of new developers at the grass roots. Many then go on to join enterprises who themselves are engaging in open source projects.
IBM Delivers Disaster Recovery, Security Services to SoftLayer Clients
Products and Releases  |  4/14/2014  | 
New capabilities will accelerate cloud adoption by securing vital company assets and maintaining continuous businesses operations, even in the event of a disaster.
Tripwire Donates $11.75M Cybersecurity Service to Penn State
Products and Releases  |  4/10/2014  | 
Gift is a cloud-based risk and analytics cybersecurity service to the Center for Cyber Security, Information Privacy and Trust.
(ISC)2 Intros Program to Develop Global Cybersecurity Education
Products and Releases  |  4/10/2014  | 
Global universities now have access to the largest, most current compendium of information and software security topics
CSC's New App Security Offering
Products and Releases  |  4/9/2014  | 
Help organizations to test the security of software applications and build security into the software development lifecycle.
Study Reveals 40% of Data Needs Protection; Less than Half of that Gets It
Products and Releases  |  4/9/2014  | 
"There is too much information, its too diverse and too fast."
NSS Labs Releases Latest Browser Security Test Results
Products and Releases  |  4/9/2014  | 
Internet Explorer holds the lead with over 99 percent block rate; Chrome block rate drops 13 percent.
Siemens and McAfee, a division of Intel Security, team up to provide security solutions and services for industrial customers
Products and Releases  |  4/7/2014  | 
Industrial integration, connectivity and the Internet of Things presents unique security challenges
KnowBe4 Issues CryptoDefense Warning Ransomware is Worse than CryptoLocker
Products and Releases  |  4/7/2014  | 
KnowBe4 alerts computer users of new ransomware, how to avoid infection and how to avoid being caught up in a cyber-gang war
Made in IBM Labs: Enabling Secure Notifications to Mobile Devices via the Cloud
Products and Releases  |  4/7/2014  | 
Invention helps app developers secure data shared with third-party mobile networks
Ellie Mae Hit By DDoS Attack
Products and Releases  |  4/2/2014  | 
No evidence of a data breach and client data and personal borrower data remain secure.
INSIDE Secure to sign a new NFC technology and IP license agreement with Intel
Products and Releases  |  4/1/2014  | 
Agreement builds on relationship with Intel Corporation initiated with their NFC technology license agreement in 2011.
Page 1 / 2   >   >>


One in Three SOC Analysts Now Job-Hunting
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/12/2018
Encrypted Attacks Continue to Dog Perimeter Defenses
Ericka Chickowski, Contributing Writer, Dark Reading,  2/14/2018
Can Android for Work Redefine Enterprise Mobile Security?
Satish Shetty, CEO, Codeproof Technologies,  2/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: One agent too many was installed on Bob's desktop.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.