Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in May 2010
Page 1 / 2   >   >>
AT&T Study: U.S. Businesses Improving Continuity Planning
Products and Releases  |  5/28/2010  | 
Investment in new technologies up in 2010
Digital Forensics Contest And Summit To Combat The APT
Products and Releases  |  5/27/2010  | 
Mission of contest is to analyze the packet capture containing an exploit, build a time line, and submit the evidence
Solear Donates Network Forensics Appliances To Colleges, Universities, Training Organizations
Products and Releases  |  5/27/2010  | 
Company donates network forensics appliances to cyberdefense training programs
Rapid7 And Agiliance Integrate Their Products
Products and Releases  |  5/27/2010  | 
Technology integration will provide rich vulnerability data, risk metrics, and enterprise compliance intelligence to customers
Verifi Offloads PCI Compliance, Fraud Prevention For Online Retailers
Products and Releases  |  5/27/2010  | 
Hosted payment page enables merchants to outsource PCI compliance and fraud prevention
Astaro RED Simplifies Branch Office Security
Products and Releases  |  5/27/2010  | 
Remote Ethernet Device offers UTM security for branch offices
European Commission Seeks High Privacy Standards In EU-US Data Protection Agreement
Products and Releases  |  5/27/2010  | 
Agreement would enhance the right of citizens to access, rectify, or delete data
Lieberman Software Partners With Raytheon
Products and Releases  |  5/27/2010  | 
Raytheon SureView combined with Lieberman Software's Enterprise Random Password Manager protects against insider threats
Optenet Forms Global Strategic Partnership With Sophos
Products and Releases  |  5/27/2010  | 
Sophos' anti-virus scanning functionality will be integrated into Optenet’s flagship Web and Email security offerings
Cloud-Ready Data Integrity Service Gaining Ground
Products and Releases  |  5/27/2010  | 
GuardTime raises $8 million in Series A funding
Survey: Security Audit Costs Expected To Increase This Year
Products and Releases  |  5/27/2010  | 
47% of IT pros see security audit costs increasing in 2010
New Free 'Secure My Profile' Tool Debuts For Facebook
Products and Releases  |  5/27/2010  | 
Secure My Profile walks the user through the privacy setting changes
Mandiant Rolls Out New Incident Response Product
Products and Releases  |  5/26/2010  | 
MIR v1.4 includes support for the OpenIOC open indicator format
New ActivIdentity Banking Security Appliance Debuts
Products and Releases  |  5/25/2010  | 
ActivIdentity 4TRESS Appliance offers support for various authentication methods
HBGary Digital DNA Interoperates With Guidance Software EnCase Enterprise Platform
Products and Releases  |  5/25/2010  | 
Digital DNA flags malware and suspicious binaries
Guardian Analytics Secures $9 Million In Venture Funding
Products and Releases  |  5/25/2010  | 
VC will be used to accelerate product innovation and capitalize on the growing demand for fraud prevention solutions
Trend Micro Bundles Consumer Internet Security With Identity Protection And Laptop Theft Recovery Services
Products and Releases  |  5/25/2010  | 
Trend Micro teams with IdentityTruth and Absolute Software
McAfee To Acquire Mobility Management And Security Firm Trust Digital
Products and Releases  |  5/25/2010  | 
McAfee to couple Trust Digital's enterprise mobility management solution with McAfee endpoint protection capabilities
Armorize Rolls Out HackAlert 3.0
Products and Releases  |  5/25/2010  | 
Provides real-time detection and alarms for Zero Day malware hidden in websites and online advertisements
Firewall For Your Wallet
Products and Releases  |  5/25/2010  | 
DataSafe Wallets, Passport Wallets designed to thwart identity theft
NitroSecurity Announces End-To-End NERC CIP Solution
Products and Releases  |  5/25/2010  | 
NitroView CIP offers direct monitoring and assessment of cyberassets for electric power industry
Check Point Rolls Out Free ZoneAlarm Firewall
Products and Releases  |  5/24/2010  | 
ZoneAlarm Free Firewall includes both an inbound and outbound firewall
Imperva Introduces Virtual Data Security Suite
Products and Releases  |  5/24/2010  | 
SecureSphere Virtual Appliances provide Web application and database firewalls, as well as database activity monitoring
National Tenant Network Data Centers Now SAS70 Type II Compliant
Products and Releases  |  5/20/2010  | 
Access to non-public information through NTN systems and networks is limited to individuals who have legitimate business need to access such information
TSA Awards Information Technology, Secure Infrastructure Contract
Products and Releases  |  5/20/2010  | 
CSC to handle deployment, maintenance, and enhancement of TSA's IT infrastructure capabilities
PGP Corporation, Protegrity Partner To Provide Continuous End-To-End Security
Products and Releases  |  5/20/2010  | 
Joint solutions will bring together desktop data protection and server data protection
nCircle Announces Cloud-Based Perimeter Profiler
Products and Releases  |  5/20/2010  | 
Virtualized appliance enables organizations to assess their Internet-facing assets from an external perspective
Veracode To Launch ZeroDay Labs
Products and Releases  |  5/20/2010  | 
Core to its community-building goals, ZeroDay Labs will offer code-level examples of vulnerabilities drawn from member experiences
Shavlik Refocuses, Moves Patch Management To The Cloud
Products and Releases  |  5/20/2010  | 
Rolls solution into PatchCloud, OpsCloud
Vodacom Business And Novell Partner To Securely Manage And Optimize Cloud Services
Products and Releases  |  5/19/2010  | 
Vodacom to provide infrastructure and software-as-a-service solutions across Africa using many of Novell's Intelligent Workload Management technologies
Hackers Using the Final Episode Of "Lost" To Spread The MySecurityEngine Fake Antivirus
Products and Releases  |  5/19/2010  | 
Recent death of rock singer Ronnie James Dio is also being used to distribute fake antivirus programs
Astaro Solutions Offer Secure Remote Access To iPad Users
Products and Releases  |  5/19/2010  | 
Astaro Security Gateway Essential Firewall and Home Use editions support PPTP, L2TP, and IPSec VPN connections for making secure tunnels with the iPad
dataguise Announces Free Trial Of dgdiscover For Oracle
Products and Releases  |  5/19/2010  | 
dgdiscover for Oracle will find database repositories and identify any data at risk within that database
Symplified Announces Major Security Initiative For Amazon Cloud Platform
Products and Releases  |  5/19/2010  | 
Symplified Trust CloudT addresses regulatory compliance, single sign-on, and access management issues on the Amazon platform
McAfee Rolls Out New Web Gateway
Products and Releases  |  5/19/2010  | 
McAfee Web Gateway version 7 enables employee access to authorized Web 2.0 applications
Novell Rolls Out Identity Manager 4
Products and Releases  |  5/19/2010  | 
Identity Manager 4 ensures consistent identity, security, and compliance policies for an organization's entire IT ecosystem
FaceTime Releases Enterprise Solution To Monitor And Archive Social Media
Products and Releases  |  5/19/2010  | 
Unified Security Gateway 4 lets you preapprove social media posts to Facebook, Twitter, and LinkedIn to prevent data leaks and violations of company policy
AlertBoot Extends Managed Encryption Service With 64-Bit Support For Windows 7 Users
Products and Releases  |  5/19/2010  | 
Company upgrades encryption infrastructure with Sophos Safeguard 5.5 Enterprise
Microsoft Files Two Lawsuits For 'Click-Laundering' Activity
Products and Releases  |  5/19/2010  | 
Two new lawsuits allege click launderers tried to cheat advertisers
RSA Offers Advanced Solutions To Help Combat Man-In-The-Browser Attacks
Products and Releases  |  5/18/2010  | 
Man-in-the-Browser Solutions includes newly enhanced transaction monitoring and risk-based authentication
Sipera Raises $10M For Smartphone, VoIP Security
Products and Releases  |  5/18/2010  | 
Funding will help the advance its smartphone UC security solutions and UC-Sec enterprise UC security product family
Fortinet Introduces High-Performance Enterprise-Class Firewall Appliance
Products and Releases  |  5/18/2010  | 
New FortiGate series delivers up to 120 Gbps firewall throughput
Dasient Unveils Automated Solution For Malvertising
Products and Releases  |  5/18/2010  | 
Anti-Malvertising Solution discovers and diagnoses malicious ads
Application Monitoring Comes To Microsoft's Open Source Hosting Site
Products and Releases  |  5/18/2010  | 
Runtime Intelligence Service will publish application and feature usage statistics for Microsoft's CodePlex
Emsisoft Anti-Malware 5.0 Released
Products and Releases  |  5/18/2010  | 
New version is fully x64 compatible
Smartphone Security Firm Lookout Raises $11M In VC Funding
Products and Releases  |  5/18/2010  | 
Lookout also announced it has added several new executives to its leadership team
StillSecure Launches New Log Management Service
Products and Releases  |  5/17/2010  | 
ProtectPoint consolidates and organizes log events from network systems, devices, applications, and other tools
TeleCommunication Systems Opens Art of Exploitation University
Products and Releases  |  5/17/2010  | 
University will work with government attendees in the fields of cybersecurity and analysis, computer penetration testing, red teaming, vulnerability analysis, and exploitation
EU Agency Maps Key Online Security Actors, Strategies, And Good Practices Across Europe
Products and Releases  |  5/17/2010  | 
European countries are highly varied in how prepared they are for dealing with the cybercrime, attacks and network resilience
Palo Alto Networks Resolves New Facebook Social Plug-ins Privacy Concerns
Products and Releases  |  5/17/2010  | 
App-ID allows IT security teams to protect their Facebook users against undesired data sharing
Page 1 / 2   >   >>

Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-13
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
PUBLISHED: 2019-12-13
samurai 0.7 has a heap-based buffer overflow in canonpath in util.c via a crafted build file.
PUBLISHED: 2019-12-13
Yabasic 2.86.2 has a heap-based buffer overflow in myformat in function.c via a crafted BASIC source file.
PUBLISHED: 2019-12-13
E5572-855 with versions earlier than has an improper authentication vulnerability. The device does not perform a sufficient authentication when doing certain operations, successful exploit could allow an attacker to cause the device to reboot after launch a man in the middle att...
PUBLISHED: 2019-12-13
Huawei smartphones HUAWEI Y9 2019 and Honor View 20 have a denial of service vulnerability. Due to insufficient input validation of specific value when parsing the messages, an attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices to exploit this vul...