Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in April 2014
Page 1 / 2   >   >>
Imperva Advances Protection Against Data Breaches
Products and Releases  |  4/30/2014  | 
Proactive Controls Close Massive Security Gaps Caused by IT Complexity
Study: Sensitive Info Is 'Readable In Cloud
Products and Releases  |  4/30/2014  | 
Annual global survey from Thales reveals widespread uncertainty about cloud security and negative impacts on security posture.
Foresight Launches Defacement Mitigator for Cyber-Security Protection
Products and Releases  |  4/30/2014  | 
Solution Rapidly Addresses Online "Hacktivism"
Criminal network involved in payment card fraud dismantled with INTERPOL support
Products and Releases  |  4/30/2014  | 
INTERPOL assisted information exchange among investigators worldwide in USD 45 million theft
F-Secure Releases First Quarter Mobile Threat Report
Products and Releases  |  4/30/2014  | 
Nearly all new mobile threats in Q1 2014 targeted Android users, and cybercriminals continued to innovate with a list of first-ever threats on the platform
To Address Global Cybersecurity Skills Crisis, ISACA Unveils Comprehensive Cybersecurity Nexus Program
Products and Releases  |  4/30/2014  | 
One in five businesses has experienced an APT attack, yet 62% of enterprises are not increasing security training in 2014
Onapsis Inc. Announces Its Inclusion in the SAP PartnerEdge Program and Onapsis X1 Now Available on SAP Store
Products and Releases  |  4/30/2014  | 
Certified to integrate with the SAP NetWeaver platform
Target Appoints New Chief Information Officer, Outlines Updates on Security Enhancements
Products and Releases  |  4/29/2014  | 
Company plans to enable REDcard portfolio with MasterCard chip-and-PIN technology
Report: Financial Firms Voice Concerns About 3rd Party 'Privileged User' Creds
Products and Releases  |  4/29/2014  | 
55 percent of European financial organisations believe third party contractors pose the biggest risk; 52 percent find insider threats harder to detect than last year
Courion survey: IT security execs have breach anxiety
Products and Releases  |  4/29/2014  | 
Management of Access Privileges Cited as Critical to Reducing Risk and Increasing Security.
New DDoS Stats: NTP Used in 56% of Large Attacks
Products and Releases  |  4/29/2014  | 
4.4% of Websites With SSL and 8.7% of Android Devices With SSL Libraries Are Still Vulnerable
Products and Releases  |  4/25/2014  | 
What's left of the Heartbleed in SSL-based websites and mobile apps
Authentic8 Enhances Silo for Heartbleed
Products and Releases  |  4/24/2014  | 
Silo users will now benefit from automatic monitoring of their web accounts to protect personal information from being compromised via Heartbleed.
SecureAuth IdP Qualifies For Microsoft Office 365 Qualification
Products and Releases  |  4/23/2014  | 
Successfully Implements the Widely Used WS Federation/WS-Trust Identity Standard to Provide a Single Sign-on and Attribute Exchange Framework
NIST Removes Cryptography Algorithm from Random Number Generator Recommendations
Products and Releases  |  4/22/2014  | 
September 2013, news reports prompted public concern about the trustworthiness of Dual_EC_DRBG. As a result, NIST immediately recommended against the use of the algorithm and reissued SP 800-90A for public comment.
Black Lotus Threat Report Predicts New DrDoS Attacks in Excess of 800 Gbps in 2015
Products and Releases  |  4/22/2014  | 
Service providers, carriers must strengthen security to protect operations during next 12 to 18 months
Cloud Control: Launch of Entrust IdentityGuard Cloud Services Simplifies Certificate Management, Credentialing
Products and Releases  |  4/22/2014  | 
New cloud-based console simplifies management of SSL, PKI, certificate discovery, device certificates and credentialing
Verizon Expands Cloud Solutions, With Secure Cloud Interconnect
Products and Releases  |  4/22/2014  | 
Organizations can now use private IP to securely connect multi-cloud environments around the globe
Mocana Calls Heartbleed a Wake-Up Call for Makers of Smart Connected Devices
Products and Releases  |  4/22/2014  | 
Properly protecting the Internet of Things will require changes from business as usual
HID Global Security Survey and Infographic Reveal Attitudes about Best Practices for Physical Access Control
Products and Releases  |  4/22/2014  | 
Significant majority of survey respondents acknowledge importance of top technology and policy best practices, yet far fewer say they are implementing them well or at all.
Cisco Launches Managed Threat Defense Service
Products and Releases  |  4/22/2014  | 
Solution Helps Defends Against Known Intrusions, Protect from Unknown Attacks and Guard Against Advanced Persistent Threats.
Belden Rolls Out Advanced Cyber Security Toolkit
Products and Releases  |  4/22/2014  | 
New Tofino Enforcer Software Development Kit Brings Next Generation Security to SCADA Networks
Total Defense Announces Merger of Consumer Business and Launches Stand-alone Corporate Cloud Business
Products and Releases  |  4/21/2014  | 
Provider of Internet Security Solutions Merges Consumer Business Line with Untangle; Rebrands Enterprise Business as iSheriff
Trend Micro Enhances User Protection Solution
Products and Releases  |  4/21/2014  | 
Provides simple, comprehensive security across endpoints using cloud, hybrid or on-premise deployment
Study finds 52% of enterprises defenseless against cyber attacks
Products and Releases  |  4/17/2014  | 
New report highlights need for layered endpoint security strategy.
Cryptzone Survey Reveals SharePoint Users are Breaching Security Policies
Products and Releases  |  4/17/2014  | 
With administrators the worst perpetrators perceiving their permission as unrestricted
Understanding Risk from Business Perspective Is Top Concern for Network Security Organizations
Products and Releases  |  4/17/2014  | 
Majority of AlgoSec survey respondents feel that business stakeholders need to own the risk of their data center applications
New Survey: Half of IT Professionals Make Undocumented Changes to IT Systems
Products and Releases  |  4/17/2014  | 
Just 60% of Organizations have Change Management Controls in Place, Leaving 40% at Risk from Security Threats or System Downtime
SMS PASSCODE Announces North America Launch
Products and Releases  |  4/16/2014  | 
Industry Veteran Henrik Jeberg Joins Team to Manage and Grow SMS
New Osterman Research Report: Only 13% Happy With Compliance Methods
Products and Releases  |  4/16/2014  | 
Burdensome Compliance Management Processes are Eating Into IT Budget
Sophos Boosts Network Security with New Hardware Appliances
Products and Releases  |  4/16/2014  | 
SG Series Utilizes New Intel Core Processors to Accelerate Sophos UTM and Next-Gen Firewall Solutions
More Than Half of Organizations Filter Out Negative Facts Before Communicating Security Risk to C-Level Executives
Products and Releases  |  4/16/2014  | 
New Ponemon Study, Sponsored by FireMon, Finds Massive Overconfidence in Enterprise Security Strength; Ineffective Communications, Inability to Measure and Accommodate Change Drive Substantial Risk.
AlienVault Announces Beta Version of Open Threat Exchange 2.0
Products and Releases  |  4/14/2014  | 
Company continues to see rapid growth for its unique crowd-sourced Open Threat Exchange with 26,000 participants and more than 1 million threat indicators daily
Survey: As Companies Move to the Cloud, Increased Security is their Biggest IT Concern
Products and Releases  |  4/14/2014  | 
Autotask Survey also Details IT Hiring Plans, Billing Rates and What's Driving Demand for IT Services
Future of Open Source Survey: OSS Powering New Technologies, Creating New Economics
Products and Releases  |  4/14/2014  | 
Open source is enjoying a proliferation that starts with a growing number of new developers at the grass roots. Many then go on to join enterprises who themselves are engaging in open source projects.
IBM Delivers Disaster Recovery, Security Services to SoftLayer Clients
Products and Releases  |  4/14/2014  | 
New capabilities will accelerate cloud adoption by securing vital company assets and maintaining continuous businesses operations, even in the event of a disaster.
Tripwire Donates $11.75M Cybersecurity Service to Penn State
Products and Releases  |  4/10/2014  | 
Gift is a cloud-based risk and analytics cybersecurity service to the Center for Cyber Security, Information Privacy and Trust.
(ISC)2 Intros Program to Develop Global Cybersecurity Education
Products and Releases  |  4/10/2014  | 
Global universities now have access to the largest, most current compendium of information and software security topics
CSC's New App Security Offering
Products and Releases  |  4/9/2014  | 
Help organizations to test the security of software applications and build security into the software development lifecycle.
Study Reveals 40% of Data Needs Protection; Less than Half of that Gets It
Products and Releases  |  4/9/2014  | 
"There is too much information, its too diverse and too fast."
NSS Labs Releases Latest Browser Security Test Results
Products and Releases  |  4/9/2014  | 
Internet Explorer holds the lead with over 99 percent block rate; Chrome block rate drops 13 percent.
Siemens and McAfee, a division of Intel Security, team up to provide security solutions and services for industrial customers
Products and Releases  |  4/7/2014  | 
Industrial integration, connectivity and the Internet of Things presents unique security challenges
KnowBe4 Issues CryptoDefense Warning Ransomware is Worse than CryptoLocker
Products and Releases  |  4/7/2014  | 
KnowBe4 alerts computer users of new ransomware, how to avoid infection and how to avoid being caught up in a cyber-gang war
Made in IBM Labs: Enabling Secure Notifications to Mobile Devices via the Cloud
Products and Releases  |  4/7/2014  | 
Invention helps app developers secure data shared with third-party mobile networks
Ellie Mae Hit By DDoS Attack
Products and Releases  |  4/2/2014  | 
No evidence of a data breach and client data and personal borrower data remain secure.
INSIDE Secure to sign a new NFC technology and IP license agreement with Intel
Products and Releases  |  4/1/2014  | 
Agreement builds on relationship with Intel Corporation initiated with their NFC technology license agreement in 2011.
Page 1 / 2   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.