Products and Releases

Content posted in May 2012
Page 1 / 3   >   >>
Juniper Networks Releases New Mykonos Security Software To Stop Web Attacks
Products and Releases  |  5/31/2012  | 
Mykonos software uses attacker's behavior against them
Updated Map And Inventory of Europe's "Digital Fire Brigades" With 173 Computer Emergency Response Teams Listed
Products and Releases  |  5/31/2012  | 
An updated version of the Inventory of CERT activities in Europe is also available
Symplified And Qubera Partner On Identity Management For Cloud, SaaS And Mobile Apps
Products and Releases  |  5/31/2012  | 
Qubera Solutions will provide Symplified solutions to customers that need to unify IAM for premises-based, cloud, and mobile applications
Plixer And Enterasys Networks Enhance BYOD Security And Reporting
Products and Releases  |  5/31/2012  | 
Webcast reveals methods to leverage NetFlow reporting and mobile IAM features
RSA Archer eGRC Platform Expanded
Products and Releases  |  5/31/2012  | 
Newest release includes a Regulatory Management solution
StillSecure To Offer Managed Security Services For Rackspace Cloud Customers
Products and Releases  |  5/30/2012  | 
Cloud Network Security Appliance allows customers to spin up a managed security cloud server within their public cloud infrastructure
Panorama9 Integrates With Zendesk To Offer Enterprise-Grade IT Management In The Cloud
Products and Releases  |  5/30/2012  | 
Integration turns issues detected by Panorama9 into Zendesk tickets
McAfee Finds One In Every Six Personal Computers Have Zero Protection
Products and Releases  |  5/30/2012  | 
Vulnerability poses a threat not just to those unprotected computers, but to anyone connected to them
FireMon Delivers Security Posture Management
Products and Releases  |  5/30/2012  | 
Security Manager 6.0 combines risk analysis with configuration management, enforcement, and auditing of network devices
Jennifer Granick To Direct New Civil Liberties Center At Stanford Law School Center For Internet And Society
Products and Releases  |  5/30/2012  | 
Granick is a renowned expert in computer crime and security, electronic surveillance, privacy, data protection, copyright and technology regulation
Elliptic Technologies Joins FIDO Alliance
Products and Releases  |  5/29/2012  | 
Hardware Enforced Security with Elliptics tVault Provides Seamless Protection of Authentication Secrets.
New Report Reveals Major Shift In CSO Role And New Trends For Risk-Based Security Practices
Products and Releases  |  5/25/2012  | 
Wisegate report discusses how IT organizations can up their security game
FoxT ServerControl Achieves Oracle Validated Integration With Oracle Identity Management
Products and Releases  |  5/24/2012  | 
New Web services-based connector from FoxT enables data interchange between Oracle Identity Manager and FoxT ServerControl
Total Defense Announces New Cloud Security Platform
Products and Releases  |  5/24/2012  | 
Total Defense Cloud Security for Web and email protection
Trend Micro Pioneers Integration Of Data-Loss Prevention (DLP) Across The Enterprise
Products and Releases  |  5/23/2012  | 
Trend Micro Control Manager provides central management that's newly integrated for both data and threat protection
Execs To Study Cyber Security In New NYU-Poly Master's Degree Track
Products and Releases  |  5/23/2012  | 
Curriculum covers fundamentals of information security management
User-Generated Content Singled Out In Military Dating Hack
Products and Releases  |  5/23/2012  | 
Imperva releases May Hacker Intelligence report
ICSA Labs Launches First Testing Program Of VPN Security For Mobile Device
Products and Releases  |  5/23/2012  | 
Mobile Device VPN Security available for wireless carriers and mobile device manufacturers
Intel Introduces Cloud-Based Identity Solution For Salesforce And Other Cloud Applications
Products and Releases  |  5/23/2012  | 
Solution will help enterprise users utilize their Salesforce credentials to access popular cloud applications
Nominum Mobile Security Solution Protects Both The User And The Network
Products and Releases  |  5/23/2012  | 
Leverages essential Domain Name System (DNS) to reduce latency and network failure
General Dynamics And Samsung Team To Deliver Secure Wireless Products
Products and Releases  |  5/23/2012  | 
Companies will provide mobile users with commercial off-the-shelf wireless products that enable secure Internet browsing and access to government networks
Cyber-Ark Partners With Carahsoft To Deliver IT Security Solutions To Government Sector
Products and Releases  |  5/22/2012  | 
Cyber-Ark’s solutions are positioned to help government organizations meet FISMA requirements
Guidance Software Launches Encas App Central
Products and Releases  |  5/22/2012  | 
EnCase App Central is a new marketplace for digital investigation apps
WatchGuard Continues Pattern Of Strong Growth
Products and Releases  |  5/22/2012  | 
Company notes five consecutive quarters of double-digit growth
Lookingglass Announces New Cyber Threat Alert And Warning Capability, CyberHUD
Products and Releases  |  5/22/2012  | 
CyberHUD monitors global networks for resiliency, threats, malware, routing hijacks and malicious actor’s tools, tactics, and procedures
Copiun TrustedShare for Good Is First to Provide Secure Access To SharePoint And File Servers From Smartphones And Tablets
Products and Releases  |  5/22/2012  | 
Copiun has teamed up with Good to develop a technology that meets federally mandated data security standards in the U.S.
NetAuthority Launches, Radically Transforming Device Authentication
Products and Releases  |  5/22/2012  | 
Company positioned to solve challenges associated with mass adoption of strong authentication solutions
Varonis Research Uncovers What IT Security Wants Most From Big Data
Products and Releases  |  5/22/2012  | 
More than two-thirds of those surveyed think Big Data should be a strategic priority
Check Point Report: More Than Half Of Targeted Attacks Driven By Financial Fraud
Products and Releases  |  5/22/2012  | 
Denial-of-service attacks and botnets pose increased risk to organizations, with successful attacks costing businesses over $100,000 per incident
Veracode Infographic On Cybersecurity Risks In Public Companies
Products and Releases  |  5/21/2012  | 
Infographic follows up to the company’s State of Software Security Report
Agiliance Automates Security Assessment Of Gov Cloud Services
Products and Releases  |  5/17/2012  | 
Announces availability of Federal Risk and Authorization Management Program (FedRAMP) Content Pack
Infoglide And BusinessForensics Partner For Fraud, Risk Management Solutions
Products and Releases  |  5/17/2012  | 
Infoglide’s Identity Resolution Engine software will enhance capabilities across BusinessForensic’s suite of fraud detection and risk management products
Agnitum: PC Security Test shows Antivirus Products Being Left Behind
Products and Releases  |  5/17/2012  | 
PC Security test reveals users of 64-bit Windows Anti-Viruses are being left behind
Paymetric Deploys Secure Mobile Payments
Products and Releases  |  5/17/2012  | 
Partners with Velocitor Solutions to offer merchants with mobile sales forces a solution to secure payment transactions from their mobile devices
New Research From Fidelis Security Systems And IANS Shows Heightened Need For Advanced Threat Defense
Products and Releases  |  5/17/2012  | 
Survey underscores the heightened risk associated with content-layer threats
ICASI Releases Update To XML Framework For Reporting IT System Vulnerabilities
Products and Releases  |  5/17/2012  | 
Enhancements in CVRF 1.1 offer users a more comprehensive and flexible format
Viewfinity Releases Next-Gen Privilege Management Software
Products and Releases  |  5/17/2012  | 
Viewfinity Privilege Management 4.0 automatically sets policies for rights and privileges
Arxan Introduces End-to-End Protection Of Java And Native Apps
Products and Releases  |  5/17/2012  | 
Enhances Mobile Application Protection Suite to include multilayered, end-to-end protection for Android applications
How The Social Security Administration Making Online Access To Earnings Secure For Consumers
Products and Releases  |  5/17/2012  | 
Experian fraud prevention services help SSA provide consumers with secure and convenient online access to their Social Security earnings and benefit information
RSA Helps Accelerate Adoption Of Encryption Key Management Interoperability With KMIP-Enabled Solution
Products and Releases  |  5/17/2012  | 
Integrates KMIP 1.0 in RSA Data Protection Manager
SEALs, Spies, Security, Celebrity: Suits And Spooks Anti-Conference Comes To Los Angeles
Products and Releases  |  5/16/2012  | 
Third conference brings together individuals from the U.S. intelligence community with innovative thinkers from a wide variety of disciplines
Comodo And TeleSign Partner To Deliver Intelligent Authentication
Products and Releases  |  5/16/2012  | 
Announce joint layered security solution combining digital certificates and out-of-band phone-based authentication
Information Services Group Joins Cloud Security Alliance
Products and Releases  |  5/16/2012  | 
ISG will align services to best practice frameworks, contribute to definition of standards
Identropy Sets Its Sights On The Emerging IDaaS Market
Products and Releases  |  5/16/2012  | 
Expands management team
Newly Published ControlScan White Paper Educates Small Merchants On Top Five Data Security Best Practices
Products and Releases  |  5/16/2012  | 
White paper designed to help small merchants become a less likely target for data thieves
Digital Defense Identifies Vulnerability On Epicor Software Interface
Products and Releases  |  5/16/2012  | 
Vulnerability could potentially be leveraged by an attacker to execute arbitrary SQL commands
McAfee and Intel Announce Critical Infrastructure Protection
Products and Releases  |  5/15/2012  | 
Companies have provided a blueprint for a comprehensive solution of multiple products that create layers of security
Application Security, Inc. Pledges $1 Million Of Database Security Software To Help Enterprises Battle Data Breaches
Products and Releases  |  5/15/2012  | 
Companies that choose to take advantage of the offer will receive a free one-year license of AppSecInc’s database security scanning and assessment tool
Beazley Brings State Of The Art Data Breach Protection For Small Firm
Products and Releases  |  5/14/2012  | 
BBR Select aimed at smaller firms with revenues of less than $10 million
ForeScout And Fiberlink Team On Fully Integrated NAC And MDM Solution
Products and Releases  |  5/14/2012  | 
ForeScout MDM combines cloud-based mobile device management services, comprehensive device support, and unified security control
Page 1 / 3   >   >>


12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.