Products and Releases

Content posted in June 2009
Page 1 / 3   >   >>
Sunbelt Software Joins StopBadware.org To Fight Badware
Products and Releases  |  6/30/2009  | 
Sunbelt Software joins Google in contributing data to the project
Exobox Releases SaaS Data Leak Detection, Protection Software
Products and Releases  |  6/30/2009  | 
ExoDetect is designed to identify and recover information, intellectual property
Veracode Announces Cloud-Based Solution To Secure Mobile Applications
Products and Releases  |  6/30/2009  | 
SecurityReview immediate available for Windows Mobile, with near-term support for other platforms, such as RIM BlackBerry, Google Android, and Apple iPhone
Unisys Reveals Cloud Computing, Security Strategy
Products and Releases  |  6/30/2009  | 
Underpinning strategy is Unisys Stealth data protection technology, initially designed for government applications and now available to commercial clients
Court Rules That Zango Can't Sue Kaspersky Over Blocked 'Adware'
Products and Releases  |  6/30/2009  | 
Kaspersky Lab, which classified online media company Zango's software as malware and "protected" users from it, is not liable for restricting user access
Survey: Money Laundering, Fraud Dominate Financial Institutions' Top Priorities
Products and Releases  |  6/29/2009  | 
91% of the participants see a business value in adopting the risk-based approach regardless of their country's regulation
U.K. Biometrics Industry Adds Occupational Standards
Products and Releases  |  6/29/2009  | 
National Occupational Standards (NOS) will be used to support individual and organizational development and quality assurance
Perimeter Launches Viewpoint 2.0 Correlative Security Engine
Products and Releases  |  6/29/2009  | 
Viewpoint 2.0 includes compliance reporting and educational risk analysis to create a profile of risk with recommended solutions
Paul Giardina Named CEO Of Protegrity
Products and Releases  |  6/29/2009  | 
Giardina joined Protegrity, which provides data security management solutions, in December 2004
CoSoSys Launches Web-Based Protection For Portable Devices
Products and Releases  |  6/29/2009  | 
My Endpoint Protector delivers cloud-based data loss prevention and device control
Lumension Integrates Network Frontiers' Unified Compliance Framework With Lumension Risk Manager
Products and Releases  |  6/29/2009  | 
Integration gives Lumension Risk Manager customers direct access to UCF's compliance database
Core Security Unveils IMPACT Pro v9 Pen-Testing Software
Products and Releases  |  6/29/2009  | 
New release expands enterprise management functionality, security testing capabilities
Report: Data-Stealing Malware Leads To Rise In Cybercrime, Cyberterrorism
Products and Releases  |  6/29/2009  | 
In its first Focus Report, Trend Micro examines the growth of data-stealing malware, its characteristics, and its roots in the underground cyber crime economy
Oracle Applications Now Certified With Oracle's Data Encryption Feature
Products and Releases  |  6/29/2009  | 
Oracle Advanced Security, an option to Oracle Database 11g Enterprise Edition, transparently encrypts all application data stored in an Oracle Database tablespace
Enterasys Reports Increased Network Access Control Revenue
Products and Releases  |  6/29/2009  | 
Year-over-year revenue for Enterasys Network Access Control (NAC) solution grows by 317%, according to company
Interoute Launches Free Internet Security Barometer Service
Products and Releases  |  6/28/2009  | 
Service provides organizations with daily insight into malicious activity on the Internet
Origo Deploys Trend Micro's Encryption Technology In Unipass Securemail Service
Products and Releases  |  6/28/2009  | 
Service secures email communications between life insurers, pension providers, and independent financial advisers
AT&T To Provide Managed Data Network, Security Services To Amtrak
Products and Releases  |  6/26/2009  | 
National railroad to help protect data network with AT&T Managed Security Services
Internet Security Expert Rod Beckstrom Named ICANN CEO
Products and Releases  |  6/26/2009  | 
Beckstrom is the former Director of the U.S. National Cybersecurity Center
Red Condor's Spam Trip Wire Detects New 'Scare Tactic' Virus
Products and Releases  |  6/25/2009  | 
Campaign designed to scare email users with bogus legal action for activities, including illegal music downloads
HDFC Bank, RSA Team On Fraud Prevention Platform
Products and Releases  |  6/25/2009  | 
India financial instituion implements RSA Adaptive Authentication, which includes visible component of site-to-user authentication
Panda Security Launches Ultra-Light 2010 Consumer Solutions
Products and Releases  |  6/25/2009  | 
Panda Antivirus for Netbooks, Panda Antivirus Pro 2010, Panda Internet Security 2010, and Panda Global Protection 2010 available for home users and professionals
Sourcefire Announces Virtual Appliances
Products and Releases  |  6/25/2009  | 
Sourcefire 3D System 4.9, with the new Sourcefire Virtual 3D Sensor and Sourcefire Virtual Defense Center, enable users to deploy the company security solutions within their virtual environments
Cyberspace Thought Leaders Discuss Challenges Facing Nation's First 'Cyber Czar'
Products and Releases  |  6/25/2009  | 
National Press Club event offers legislative, executive, and media viewpoints
PHD Virtual Releases New Freeware Solution To Simplify VMware ESX Patch Downloads
Products and Releases  |  6/24/2009  | 
Patch Downloader v6.0 automates the patch-downloading process for users who cannot use the VMware Update Manager
Texert Acquires GE's Anomaly Detection Technology
Products and Releases  |  6/24/2009  | 
ADT can be used in cybersecurity applications to provide near real-time risk warnings and alerts for monitoring systems and networks
Vamosa Unveils Check & Fix Web Site Content Monitoring Service
Products and Releases  |  6/24/2009  | 
Application, checks and automatically fixes errors, will be delivered to customers as a software-as-a-service
PCI SSC Council Announces Feedback Period For PCI DSS
Products and Releases  |  6/24/2009  | 
Between July 1 and Nov. 1, 2009, merchants, processors, financial institutions, and other key stakeholders can provide detailed and actionable feedback in an effort to revise future editions of the Council's standards to improve payment data security
Secunia Adds 'Secure Browsing' Feature To Secunia PSI Software
Products and Releases  |  6/24/2009  | 
In addition to plugging security holes, solution also advises the users about holes in browsers and their plug-ins
RSA Embeds DLP Technology, Policies Into Cisco IronPort Email Security Solutions
Products and Releases  |  6/24/2009  | 
The combined solution, to be offered as RSA Email DLP for Cisco IronPort, provides content classification designed to discover and protect sensitive data before it leaves the enterprise through email
Airvana, VeriSign Team for Femtocell Network Authentication
Products and Releases  |  6/23/2009  | 
Companies are working to deploy device certificates for Airvana's HubBub UMTS Femtocell, allowing operators to authenticate these devices before allowing access to core networks and services
McCann Global Offers Electronic Bug Sweeps
Products and Releases  |  6/23/2009  | 
Firm adds Houston-based Electronic Countermeasures team
Sipera Systems, TrustNet Team On Secure Credit Card Handling In Unified Communications Deployments
Products and Releases  |  6/23/2009  | 
In addition, Sipera and TrustNet will present a webinar on Tues., June 30, about the impact of VoIP and UC on PCI DSS compliance
Zscaler Teams With Microsoft Active Protections Program
Products and Releases  |  6/23/2009  | 
By receiving early MAPP intelligence, Zscaler can provide customers with vulnerability information in advance of its regular monthly security update release
DoD Endorses TSCP's Role In Protecting Critical Information Assets
Products and Releases  |  6/23/2009  | 
Robert Lentz, Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance, credits TSCP as a key player in the world of "standardized identity credentialing"
ICSA Labs Announces Availability Of PCI DSS Product Capability Assurance Reports
Products and Releases  |  6/23/2009  | 
New reports allow businesses to better understand product capabilities, maintain compliant networks
Symantec Announces Managed Endpoint Protection Services
Products and Releases  |  6/23/2009  | 
Offering provides management and monitoring of endpoint protection technologies, such as Symantec AntiVirus, Symantec Endpoint Protection, and Symantec Network Access Control
Finjan Releases Free SecureTwitter Plug-In
Products and Releases  |  6/23/2009  | 
SecureTwitter is powered by Finjan's SecureBrowsing plug-in, which alerts users on the safety of URLs showing in their Web 2.0 sites
IBM Unveils New Version Of IBM Tivoli Identity Manager That Includes Role Management
Products and Releases  |  6/23/2009  | 
Single solution helps organizations administer, secure, monitor, and certify user identities and their access to applications, information, and systems
CRU-DataPort Releases DataPort 10 Secure Data Protection Solution
Products and Releases  |  6/22/2009  | 
Rugged enclosure enables a hard disk drive to be removed, or hot-swapped, for data backup, transporting, and archiving
MEGA Expands GRC Solution With Risk Management Capability
Products and Releases  |  6/22/2009  | 
MEGA GRC Suite will contain an expanded risk quantification and analytics component based on Bayesian scenario calculation
SpamTitan, VMware Partner On Cloud-Based Virtual Appliance
Products and Releases  |  6/22/2009  | 
'App on Demand' lets customers create, on demand, a SpamTitan virtual appliance in the cloud
Symantec Joins The Center For Applied Identity Management Research
Products and Releases  |  6/22/2009  | 
Laura Garcia-Manrique, Symantec's VP of consumer online services, will serve on CAIMR's board of directors
Fortent Offers Hosted Solution For Midsize Financial Institutions
Products and Releases  |  6/22/2009  | 
Fortent Connect crimes management solution fights crime and manages regulatory compliance
SailPoint, Cyber-Ark Partner To Prevent Insider Threats
Products and Releases  |  6/22/2009  | 
Integrated solution combines identity governance with the ability to better control high-risk, privileged accounts
Webinar: SailPoint, Kuppinger Cole To Discuss Management Of Compliance-Relevant Applications
Products and Releases  |  6/19/2009  | 
Companies will discuss specific identity governance challenges facing large enterprises that run their businesses on SAP during June 25 webinar
Citi Cross-Certifies With Trusted PKI Bridge
Products and Releases  |  6/18/2009  | 
Bank can now deliver identity credentialing services to companies seeking to do business with the aerospace and defense industry
Proginet Launches New Secure File Software
Products and Releases  |  6/18/2009  | 
Slingshot 1.6 comes with an Outlook plug-in that provides an enhanced capability to send, secure, and control attachments
Centrify Secures Access, Privileges On SUSE Linux Enterprise Servers
Products and Releases  |  6/18/2009  | 
Identity and access management solution earns certification from both IBM and Novell
Research: 88 Percent Of American Web Users Unable To Spot Phishing Sites
Products and Releases  |  6/18/2009  | 
Respondents were asked to identify which of two Web site images presented side by side was a fraudulent phishing site, VeriSign explains
Page 1 / 3   >   >>


13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.