Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in May 2012
Page 1 / 3   >   >>
Juniper Networks Releases New Mykonos Security Software To Stop Web Attacks
Products and Releases  |  5/31/2012  | 
Mykonos software uses attacker's behavior against them
Updated Map And Inventory of Europe's "Digital Fire Brigades" With 173 Computer Emergency Response Teams Listed
Products and Releases  |  5/31/2012  | 
An updated version of the Inventory of CERT activities in Europe is also available
Symplified And Qubera Partner On Identity Management For Cloud, SaaS And Mobile Apps
Products and Releases  |  5/31/2012  | 
Qubera Solutions will provide Symplified solutions to customers that need to unify IAM for premises-based, cloud, and mobile applications
Plixer And Enterasys Networks Enhance BYOD Security And Reporting
Products and Releases  |  5/31/2012  | 
Webcast reveals methods to leverage NetFlow reporting and mobile IAM features
RSA Archer eGRC Platform Expanded
Products and Releases  |  5/31/2012  | 
Newest release includes a Regulatory Management solution
StillSecure To Offer Managed Security Services For Rackspace Cloud Customers
Products and Releases  |  5/30/2012  | 
Cloud Network Security Appliance allows customers to spin up a managed security cloud server within their public cloud infrastructure
Panorama9 Integrates With Zendesk To Offer Enterprise-Grade IT Management In The Cloud
Products and Releases  |  5/30/2012  | 
Integration turns issues detected by Panorama9 into Zendesk tickets
McAfee Finds One In Every Six Personal Computers Have Zero Protection
Products and Releases  |  5/30/2012  | 
Vulnerability poses a threat not just to those unprotected computers, but to anyone connected to them
FireMon Delivers Security Posture Management
Products and Releases  |  5/30/2012  | 
Security Manager 6.0 combines risk analysis with configuration management, enforcement, and auditing of network devices
Jennifer Granick To Direct New Civil Liberties Center At Stanford Law School Center For Internet And Society
Products and Releases  |  5/30/2012  | 
Granick is a renowned expert in computer crime and security, electronic surveillance, privacy, data protection, copyright and technology regulation
Elliptic Technologies Joins FIDO Alliance
Products and Releases  |  5/29/2012  | 
Hardware Enforced Security with Elliptic’s tVault™ Provides Seamless Protection of Authentication Secrets.
New Report Reveals Major Shift In CSO Role And New Trends For Risk-Based Security Practices
Products and Releases  |  5/25/2012  | 
Wisegate report discusses how IT organizations can up their security game
FoxT ServerControl Achieves Oracle Validated Integration With Oracle Identity Management
Products and Releases  |  5/24/2012  | 
New Web services-based connector from FoxT enables data interchange between Oracle Identity Manager and FoxT ServerControl
Total Defense Announces New Cloud Security Platform
Products and Releases  |  5/24/2012  | 
Total Defense Cloud Security for Web and email protection
Trend Micro Pioneers Integration Of Data-Loss Prevention (DLP) Across The Enterprise
Products and Releases  |  5/23/2012  | 
Trend Micro Control Manager provides central management that's newly integrated for both data and threat protection
Execs To Study Cyber Security In New NYU-Poly Master's Degree Track
Products and Releases  |  5/23/2012  | 
Curriculum covers fundamentals of information security management
User-Generated Content Singled Out In Military Dating Hack
Products and Releases  |  5/23/2012  | 
Imperva releases May Hacker Intelligence report
ICSA Labs Launches First Testing Program Of VPN Security For Mobile Device
Products and Releases  |  5/23/2012  | 
Mobile Device VPN Security available for wireless carriers and mobile device manufacturers
Intel Introduces Cloud-Based Identity Solution For Salesforce And Other Cloud Applications
Products and Releases  |  5/23/2012  | 
Solution will help enterprise users utilize their Salesforce credentials to access popular cloud applications
Nominum Mobile Security Solution Protects Both The User And The Network
Products and Releases  |  5/23/2012  | 
Leverages essential Domain Name System (DNS) to reduce latency and network failure
General Dynamics And Samsung Team To Deliver Secure Wireless Products
Products and Releases  |  5/23/2012  | 
Companies will provide mobile users with commercial off-the-shelf wireless products that enable secure Internet browsing and access to government networks
Cyber-Ark Partners With Carahsoft To Deliver IT Security Solutions To Government Sector
Products and Releases  |  5/22/2012  | 
Cyber-Ark’s solutions are positioned to help government organizations meet FISMA requirements
Guidance Software Launches Encas App Central
Products and Releases  |  5/22/2012  | 
EnCase App Central is a new marketplace for digital investigation apps
WatchGuard Continues Pattern Of Strong Growth
Products and Releases  |  5/22/2012  | 
Company notes five consecutive quarters of double-digit growth
Lookingglass Announces New Cyber Threat Alert And Warning Capability, CyberHUD
Products and Releases  |  5/22/2012  | 
CyberHUD monitors global networks for resiliency, threats, malware, routing hijacks and malicious actor’s tools, tactics, and procedures
Copiun TrustedShare for Good Is First to Provide Secure Access To SharePoint And File Servers From Smartphones And Tablets
Products and Releases  |  5/22/2012  | 
Copiun has teamed up with Good to develop a technology that meets federally mandated data security standards in the U.S.
NetAuthority Launches, Radically Transforming Device Authentication
Products and Releases  |  5/22/2012  | 
Company positioned to solve challenges associated with mass adoption of strong authentication solutions
Varonis Research Uncovers What IT Security Wants Most From Big Data
Products and Releases  |  5/22/2012  | 
More than two-thirds of those surveyed think Big Data should be a strategic priority
Check Point Report: More Than Half Of Targeted Attacks Driven By Financial Fraud
Products and Releases  |  5/22/2012  | 
Denial-of-service attacks and botnets pose increased risk to organizations, with successful attacks costing businesses over $100,000 per incident
Veracode Infographic On Cybersecurity Risks In Public Companies
Products and Releases  |  5/21/2012  | 
Infographic follows up to the company’s State of Software Security Report
Agiliance Automates Security Assessment Of Gov Cloud Services
Products and Releases  |  5/17/2012  | 
Announces availability of Federal Risk and Authorization Management Program (FedRAMP) Content Pack
Infoglide And BusinessForensics Partner For Fraud, Risk Management Solutions
Products and Releases  |  5/17/2012  | 
Infoglide’s Identity Resolution Engine software will enhance capabilities across BusinessForensic’s suite of fraud detection and risk management products
Agnitum: PC Security Test shows Antivirus Products Being Left Behind
Products and Releases  |  5/17/2012  | 
PC Security test reveals users of 64-bit Windows Anti-Viruses are being left behind
Paymetric Deploys Secure Mobile Payments
Products and Releases  |  5/17/2012  | 
Partners with Velocitor Solutions to offer merchants with mobile sales forces a solution to secure payment transactions from their mobile devices
New Research From Fidelis Security Systems And IANS Shows Heightened Need For Advanced Threat Defense
Products and Releases  |  5/17/2012  | 
Survey underscores the heightened risk associated with content-layer threats
ICASI Releases Update To XML Framework For Reporting IT System Vulnerabilities
Products and Releases  |  5/17/2012  | 
Enhancements in CVRF 1.1 offer users a more comprehensive and flexible format
Viewfinity Releases Next-Gen Privilege Management Software
Products and Releases  |  5/17/2012  | 
Viewfinity Privilege Management 4.0 automatically sets policies for rights and privileges
Arxan Introduces End-to-End Protection Of Java And Native Apps
Products and Releases  |  5/17/2012  | 
Enhances Mobile Application Protection Suite to include multilayered, end-to-end protection for Android applications
How The Social Security Administration Making Online Access To Earnings Secure For Consumers
Products and Releases  |  5/17/2012  | 
Experian fraud prevention services help SSA provide consumers with secure and convenient online access to their Social Security earnings and benefit information
RSA Helps Accelerate Adoption Of Encryption Key Management Interoperability With KMIP-Enabled Solution
Products and Releases  |  5/17/2012  | 
Integrates KMIP 1.0 in RSA Data Protection Manager
SEALs, Spies, Security, Celebrity: Suits And Spooks Anti-Conference Comes To Los Angeles
Products and Releases  |  5/16/2012  | 
Third conference brings together individuals from the U.S. intelligence community with innovative thinkers from a wide variety of disciplines
Comodo And TeleSign Partner To Deliver Intelligent Authentication
Products and Releases  |  5/16/2012  | 
Announce joint layered security solution combining digital certificates and out-of-band phone-based authentication
Information Services Group Joins Cloud Security Alliance
Products and Releases  |  5/16/2012  | 
ISG will align services to best practice frameworks, contribute to definition of standards
Identropy Sets Its Sights On The Emerging IDaaS Market
Products and Releases  |  5/16/2012  | 
Expands management team
Newly Published ControlScan White Paper Educates Small Merchants On Top Five Data Security Best Practices
Products and Releases  |  5/16/2012  | 
White paper designed to help small merchants become a less likely target for data thieves
Digital Defense Identifies Vulnerability On Epicor Software Interface
Products and Releases  |  5/16/2012  | 
Vulnerability could potentially be leveraged by an attacker to execute arbitrary SQL commands
McAfee and Intel Announce Critical Infrastructure Protection
Products and Releases  |  5/15/2012  | 
Companies have provided a blueprint for a comprehensive solution of multiple products that create layers of security
Application Security, Inc. Pledges $1 Million Of Database Security Software To Help Enterprises Battle Data Breaches
Products and Releases  |  5/15/2012  | 
Companies that choose to take advantage of the offer will receive a free one-year license of AppSecInc’s database security scanning and assessment tool
Beazley Brings State Of The Art Data Breach Protection For Small Firm
Products and Releases  |  5/14/2012  | 
BBR Select aimed at smaller firms with revenues of less than $10 million
ForeScout And Fiberlink Team On Fully Integrated NAC And MDM Solution
Products and Releases  |  5/14/2012  | 
ForeScout MDM combines cloud-based mobile device management services, comprehensive device support, and unified security control
Page 1 / 3   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.