Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in May 2012
Page 1 / 3   >   >>
Juniper Networks Releases New Mykonos Security Software To Stop Web Attacks
Products and Releases  |  5/31/2012  | 
Mykonos software uses attacker's behavior against them
Updated Map And Inventory of Europe's "Digital Fire Brigades" With 173 Computer Emergency Response Teams Listed
Products and Releases  |  5/31/2012  | 
An updated version of the Inventory of CERT activities in Europe is also available
Symplified And Qubera Partner On Identity Management For Cloud, SaaS And Mobile Apps
Products and Releases  |  5/31/2012  | 
Qubera Solutions will provide Symplified solutions to customers that need to unify IAM for premises-based, cloud, and mobile applications
Plixer And Enterasys Networks Enhance BYOD Security And Reporting
Products and Releases  |  5/31/2012  | 
Webcast reveals methods to leverage NetFlow reporting and mobile IAM features
RSA Archer eGRC Platform Expanded
Products and Releases  |  5/31/2012  | 
Newest release includes a Regulatory Management solution
StillSecure To Offer Managed Security Services For Rackspace Cloud Customers
Products and Releases  |  5/30/2012  | 
Cloud Network Security Appliance allows customers to spin up a managed security cloud server within their public cloud infrastructure
Panorama9 Integrates With Zendesk To Offer Enterprise-Grade IT Management In The Cloud
Products and Releases  |  5/30/2012  | 
Integration turns issues detected by Panorama9 into Zendesk tickets
McAfee Finds One In Every Six Personal Computers Have Zero Protection
Products and Releases  |  5/30/2012  | 
Vulnerability poses a threat not just to those unprotected computers, but to anyone connected to them
FireMon Delivers Security Posture Management
Products and Releases  |  5/30/2012  | 
Security Manager 6.0 combines risk analysis with configuration management, enforcement, and auditing of network devices
Jennifer Granick To Direct New Civil Liberties Center At Stanford Law School Center For Internet And Society
Products and Releases  |  5/30/2012  | 
Granick is a renowned expert in computer crime and security, electronic surveillance, privacy, data protection, copyright and technology regulation
Elliptic Technologies Joins FIDO Alliance
Products and Releases  |  5/29/2012  | 
Hardware Enforced Security with Elliptics tVault Provides Seamless Protection of Authentication Secrets.
New Report Reveals Major Shift In CSO Role And New Trends For Risk-Based Security Practices
Products and Releases  |  5/25/2012  | 
Wisegate report discusses how IT organizations can up their security game
FoxT ServerControl Achieves Oracle Validated Integration With Oracle Identity Management
Products and Releases  |  5/24/2012  | 
New Web services-based connector from FoxT enables data interchange between Oracle Identity Manager and FoxT ServerControl
Total Defense Announces New Cloud Security Platform
Products and Releases  |  5/24/2012  | 
Total Defense Cloud Security for Web and email protection
Trend Micro Pioneers Integration Of Data-Loss Prevention (DLP) Across The Enterprise
Products and Releases  |  5/23/2012  | 
Trend Micro Control Manager provides central management that's newly integrated for both data and threat protection
Execs To Study Cyber Security In New NYU-Poly Master's Degree Track
Products and Releases  |  5/23/2012  | 
Curriculum covers fundamentals of information security management
User-Generated Content Singled Out In Military Dating Hack
Products and Releases  |  5/23/2012  | 
Imperva releases May Hacker Intelligence report
ICSA Labs Launches First Testing Program Of VPN Security For Mobile Device
Products and Releases  |  5/23/2012  | 
Mobile Device VPN Security available for wireless carriers and mobile device manufacturers
Intel Introduces Cloud-Based Identity Solution For Salesforce And Other Cloud Applications
Products and Releases  |  5/23/2012  | 
Solution will help enterprise users utilize their Salesforce credentials to access popular cloud applications
Nominum Mobile Security Solution Protects Both The User And The Network
Products and Releases  |  5/23/2012  | 
Leverages essential Domain Name System (DNS) to reduce latency and network failure
General Dynamics And Samsung Team To Deliver Secure Wireless Products
Products and Releases  |  5/23/2012  | 
Companies will provide mobile users with commercial off-the-shelf wireless products that enable secure Internet browsing and access to government networks
Cyber-Ark Partners With Carahsoft To Deliver IT Security Solutions To Government Sector
Products and Releases  |  5/22/2012  | 
Cyber-Ark’s solutions are positioned to help government organizations meet FISMA requirements
Guidance Software Launches Encas App Central
Products and Releases  |  5/22/2012  | 
EnCase App Central is a new marketplace for digital investigation apps
WatchGuard Continues Pattern Of Strong Growth
Products and Releases  |  5/22/2012  | 
Company notes five consecutive quarters of double-digit growth
Lookingglass Announces New Cyber Threat Alert And Warning Capability, CyberHUD
Products and Releases  |  5/22/2012  | 
CyberHUD monitors global networks for resiliency, threats, malware, routing hijacks and malicious actor’s tools, tactics, and procedures
Copiun TrustedShare for Good Is First to Provide Secure Access To SharePoint And File Servers From Smartphones And Tablets
Products and Releases  |  5/22/2012  | 
Copiun has teamed up with Good to develop a technology that meets federally mandated data security standards in the U.S.
NetAuthority Launches, Radically Transforming Device Authentication
Products and Releases  |  5/22/2012  | 
Company positioned to solve challenges associated with mass adoption of strong authentication solutions
Varonis Research Uncovers What IT Security Wants Most From Big Data
Products and Releases  |  5/22/2012  | 
More than two-thirds of those surveyed think Big Data should be a strategic priority
Check Point Report: More Than Half Of Targeted Attacks Driven By Financial Fraud
Products and Releases  |  5/22/2012  | 
Denial-of-service attacks and botnets pose increased risk to organizations, with successful attacks costing businesses over $100,000 per incident
Veracode Infographic On Cybersecurity Risks In Public Companies
Products and Releases  |  5/21/2012  | 
Infographic follows up to the company’s State of Software Security Report
Agiliance Automates Security Assessment Of Gov Cloud Services
Products and Releases  |  5/17/2012  | 
Announces availability of Federal Risk and Authorization Management Program (FedRAMP) Content Pack
Infoglide And BusinessForensics Partner For Fraud, Risk Management Solutions
Products and Releases  |  5/17/2012  | 
Infoglide’s Identity Resolution Engine software will enhance capabilities across BusinessForensic’s suite of fraud detection and risk management products
Agnitum: PC Security Test shows Antivirus Products Being Left Behind
Products and Releases  |  5/17/2012  | 
PC Security test reveals users of 64-bit Windows Anti-Viruses are being left behind
Paymetric Deploys Secure Mobile Payments
Products and Releases  |  5/17/2012  | 
Partners with Velocitor Solutions to offer merchants with mobile sales forces a solution to secure payment transactions from their mobile devices
New Research From Fidelis Security Systems And IANS Shows Heightened Need For Advanced Threat Defense
Products and Releases  |  5/17/2012  | 
Survey underscores the heightened risk associated with content-layer threats
ICASI Releases Update To XML Framework For Reporting IT System Vulnerabilities
Products and Releases  |  5/17/2012  | 
Enhancements in CVRF 1.1 offer users a more comprehensive and flexible format
Viewfinity Releases Next-Gen Privilege Management Software
Products and Releases  |  5/17/2012  | 
Viewfinity Privilege Management 4.0 automatically sets policies for rights and privileges
Arxan Introduces End-to-End Protection Of Java And Native Apps
Products and Releases  |  5/17/2012  | 
Enhances Mobile Application Protection Suite to include multilayered, end-to-end protection for Android applications
How The Social Security Administration Making Online Access To Earnings Secure For Consumers
Products and Releases  |  5/17/2012  | 
Experian fraud prevention services help SSA provide consumers with secure and convenient online access to their Social Security earnings and benefit information
RSA Helps Accelerate Adoption Of Encryption Key Management Interoperability With KMIP-Enabled Solution
Products and Releases  |  5/17/2012  | 
Integrates KMIP 1.0 in RSA Data Protection Manager
SEALs, Spies, Security, Celebrity: Suits And Spooks Anti-Conference Comes To Los Angeles
Products and Releases  |  5/16/2012  | 
Third conference brings together individuals from the U.S. intelligence community with innovative thinkers from a wide variety of disciplines
Comodo And TeleSign Partner To Deliver Intelligent Authentication
Products and Releases  |  5/16/2012  | 
Announce joint layered security solution combining digital certificates and out-of-band phone-based authentication
Information Services Group Joins Cloud Security Alliance
Products and Releases  |  5/16/2012  | 
ISG will align services to best practice frameworks, contribute to definition of standards
Identropy Sets Its Sights On The Emerging IDaaS Market
Products and Releases  |  5/16/2012  | 
Expands management team
Newly Published ControlScan White Paper Educates Small Merchants On Top Five Data Security Best Practices
Products and Releases  |  5/16/2012  | 
White paper designed to help small merchants become a less likely target for data thieves
Digital Defense Identifies Vulnerability On Epicor Software Interface
Products and Releases  |  5/16/2012  | 
Vulnerability could potentially be leveraged by an attacker to execute arbitrary SQL commands
McAfee and Intel Announce Critical Infrastructure Protection
Products and Releases  |  5/15/2012  | 
Companies have provided a blueprint for a comprehensive solution of multiple products that create layers of security
Application Security, Inc. Pledges $1 Million Of Database Security Software To Help Enterprises Battle Data Breaches
Products and Releases  |  5/15/2012  | 
Companies that choose to take advantage of the offer will receive a free one-year license of AppSecInc’s database security scanning and assessment tool
Beazley Brings State Of The Art Data Breach Protection For Small Firm
Products and Releases  |  5/14/2012  | 
BBR Select aimed at smaller firms with revenues of less than $10 million
ForeScout And Fiberlink Team On Fully Integrated NAC And MDM Solution
Products and Releases  |  5/14/2012  | 
ForeScout MDM combines cloud-based mobile device management services, comprehensive device support, and unified security control
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file