Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2009
Page 1 / 3   >   >>
Sunbelt Software Joins StopBadware.org To Fight Badware
Products and Releases  |  6/30/2009  | 
Sunbelt Software joins Google in contributing data to the project
Exobox Releases SaaS Data Leak Detection, Protection Software
Products and Releases  |  6/30/2009  | 
ExoDetect is designed to identify and recover information, intellectual property
Veracode Announces Cloud-Based Solution To Secure Mobile Applications
Products and Releases  |  6/30/2009  | 
SecurityReview immediate available for Windows Mobile, with near-term support for other platforms, such as RIM BlackBerry, Google Android, and Apple iPhone
Unisys Reveals Cloud Computing, Security Strategy
Products and Releases  |  6/30/2009  | 
Underpinning strategy is Unisys Stealth data protection technology, initially designed for government applications and now available to commercial clients
Court Rules That Zango Can't Sue Kaspersky Over Blocked 'Adware'
Products and Releases  |  6/30/2009  | 
Kaspersky Lab, which classified online media company Zango's software as malware and "protected" users from it, is not liable for restricting user access
Survey: Money Laundering, Fraud Dominate Financial Institutions' Top Priorities
Products and Releases  |  6/29/2009  | 
91% of the participants see a business value in adopting the risk-based approach regardless of their country's regulation
U.K. Biometrics Industry Adds Occupational Standards
Products and Releases  |  6/29/2009  | 
National Occupational Standards (NOS) will be used to support individual and organizational development and quality assurance
Perimeter Launches Viewpoint 2.0 Correlative Security Engine
Products and Releases  |  6/29/2009  | 
Viewpoint 2.0 includes compliance reporting and educational risk analysis to create a profile of risk with recommended solutions
Paul Giardina Named CEO Of Protegrity
Products and Releases  |  6/29/2009  | 
Giardina joined Protegrity, which provides data security management solutions, in December 2004
CoSoSys Launches Web-Based Protection For Portable Devices
Products and Releases  |  6/29/2009  | 
My Endpoint Protector delivers cloud-based data loss prevention and device control
Lumension Integrates Network Frontiers' Unified Compliance Framework With Lumension Risk Manager
Products and Releases  |  6/29/2009  | 
Integration gives Lumension Risk Manager customers direct access to UCF's compliance database
Core Security Unveils IMPACT Pro v9 Pen-Testing Software
Products and Releases  |  6/29/2009  | 
New release expands enterprise management functionality, security testing capabilities
Report: Data-Stealing Malware Leads To Rise In Cybercrime, Cyberterrorism
Products and Releases  |  6/29/2009  | 
In its first Focus Report, Trend Micro examines the growth of data-stealing malware, its characteristics, and its roots in the underground cyber crime economy
Oracle Applications Now Certified With Oracle's Data Encryption Feature
Products and Releases  |  6/29/2009  | 
Oracle Advanced Security, an option to Oracle Database 11g Enterprise Edition, transparently encrypts all application data stored in an Oracle Database tablespace
Enterasys Reports Increased Network Access Control Revenue
Products and Releases  |  6/29/2009  | 
Year-over-year revenue for Enterasys Network Access Control (NAC) solution grows by 317%, according to company
Interoute Launches Free Internet Security Barometer Service
Products and Releases  |  6/28/2009  | 
Service provides organizations with daily insight into malicious activity on the Internet
Origo Deploys Trend Micro's Encryption Technology In Unipass Securemail Service
Products and Releases  |  6/28/2009  | 
Service secures email communications between life insurers, pension providers, and independent financial advisers
AT&T To Provide Managed Data Network, Security Services To Amtrak
Products and Releases  |  6/26/2009  | 
National railroad to help protect data network with AT&T Managed Security Services
Internet Security Expert Rod Beckstrom Named ICANN CEO
Products and Releases  |  6/26/2009  | 
Beckstrom is the former Director of the U.S. National Cybersecurity Center
Red Condor's Spam Trip Wire Detects New 'Scare Tactic' Virus
Products and Releases  |  6/25/2009  | 
Campaign designed to scare email users with bogus legal action for activities, including illegal music downloads
HDFC Bank, RSA Team On Fraud Prevention Platform
Products and Releases  |  6/25/2009  | 
India financial instituion implements RSA Adaptive Authentication, which includes visible component of site-to-user authentication
Panda Security Launches Ultra-Light 2010 Consumer Solutions
Products and Releases  |  6/25/2009  | 
Panda Antivirus for Netbooks, Panda Antivirus Pro 2010, Panda Internet Security 2010, and Panda Global Protection 2010 available for home users and professionals
Sourcefire Announces Virtual Appliances
Products and Releases  |  6/25/2009  | 
Sourcefire 3D System 4.9, with the new Sourcefire Virtual 3D Sensor and Sourcefire Virtual Defense Center, enable users to deploy the company security solutions within their virtual environments
Cyberspace Thought Leaders Discuss Challenges Facing Nation's First 'Cyber Czar'
Products and Releases  |  6/25/2009  | 
National Press Club event offers legislative, executive, and media viewpoints
PHD Virtual Releases New Freeware Solution To Simplify VMware ESX Patch Downloads
Products and Releases  |  6/24/2009  | 
Patch Downloader v6.0 automates the patch-downloading process for users who cannot use the VMware Update Manager
Texert Acquires GE's Anomaly Detection Technology
Products and Releases  |  6/24/2009  | 
ADT can be used in cybersecurity applications to provide near real-time risk warnings and alerts for monitoring systems and networks
Vamosa Unveils Check & Fix Web Site Content Monitoring Service
Products and Releases  |  6/24/2009  | 
Application, checks and automatically fixes errors, will be delivered to customers as a software-as-a-service
PCI SSC Council Announces Feedback Period For PCI DSS
Products and Releases  |  6/24/2009  | 
Between July 1 and Nov. 1, 2009, merchants, processors, financial institutions, and other key stakeholders can provide detailed and actionable feedback in an effort to revise future editions of the Council's standards to improve payment data security
Secunia Adds 'Secure Browsing' Feature To Secunia PSI Software
Products and Releases  |  6/24/2009  | 
In addition to plugging security holes, solution also advises the users about holes in browsers and their plug-ins
RSA Embeds DLP Technology, Policies Into Cisco IronPort Email Security Solutions
Products and Releases  |  6/24/2009  | 
The combined solution, to be offered as RSA Email DLP for Cisco IronPort, provides content classification designed to discover and protect sensitive data before it leaves the enterprise through email
Airvana, VeriSign Team for Femtocell Network Authentication
Products and Releases  |  6/23/2009  | 
Companies are working to deploy device certificates for Airvana's HubBub UMTS Femtocell, allowing operators to authenticate these devices before allowing access to core networks and services
McCann Global Offers Electronic Bug Sweeps
Products and Releases  |  6/23/2009  | 
Firm adds Houston-based Electronic Countermeasures team
Sipera Systems, TrustNet Team On Secure Credit Card Handling In Unified Communications Deployments
Products and Releases  |  6/23/2009  | 
In addition, Sipera and TrustNet will present a webinar on Tues., June 30, about the impact of VoIP and UC on PCI DSS compliance
Zscaler Teams With Microsoft Active Protections Program
Products and Releases  |  6/23/2009  | 
By receiving early MAPP intelligence, Zscaler can provide customers with vulnerability information in advance of its regular monthly security update release
DoD Endorses TSCP's Role In Protecting Critical Information Assets
Products and Releases  |  6/23/2009  | 
Robert Lentz, Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance, credits TSCP as a key player in the world of "standardized identity credentialing"
ICSA Labs Announces Availability Of PCI DSS Product Capability Assurance Reports
Products and Releases  |  6/23/2009  | 
New reports allow businesses to better understand product capabilities, maintain compliant networks
Symantec Announces Managed Endpoint Protection Services
Products and Releases  |  6/23/2009  | 
Offering provides management and monitoring of endpoint protection technologies, such as Symantec AntiVirus, Symantec Endpoint Protection, and Symantec Network Access Control
Finjan Releases Free SecureTwitter Plug-In
Products and Releases  |  6/23/2009  | 
SecureTwitter is powered by Finjan's SecureBrowsing plug-in, which alerts users on the safety of URLs showing in their Web 2.0 sites
IBM Unveils New Version Of IBM Tivoli Identity Manager That Includes Role Management
Products and Releases  |  6/23/2009  | 
Single solution helps organizations administer, secure, monitor, and certify user identities and their access to applications, information, and systems
CRU-DataPort Releases DataPort 10 Secure Data Protection Solution
Products and Releases  |  6/22/2009  | 
Rugged enclosure enables a hard disk drive to be removed, or hot-swapped, for data backup, transporting, and archiving
MEGA Expands GRC Solution With Risk Management Capability
Products and Releases  |  6/22/2009  | 
MEGA GRC Suite will contain an expanded risk quantification and analytics component based on Bayesian scenario calculation
SpamTitan, VMware Partner On Cloud-Based Virtual Appliance
Products and Releases  |  6/22/2009  | 
'App on Demand' lets customers create, on demand, a SpamTitan virtual appliance in the cloud
Symantec Joins The Center For Applied Identity Management Research
Products and Releases  |  6/22/2009  | 
Laura Garcia-Manrique, Symantec's VP of consumer online services, will serve on CAIMR's board of directors
Fortent Offers Hosted Solution For Midsize Financial Institutions
Products and Releases  |  6/22/2009  | 
Fortent Connect crimes management solution fights crime and manages regulatory compliance
SailPoint, Cyber-Ark Partner To Prevent Insider Threats
Products and Releases  |  6/22/2009  | 
Integrated solution combines identity governance with the ability to better control high-risk, privileged accounts
Webinar: SailPoint, Kuppinger Cole To Discuss Management Of Compliance-Relevant Applications
Products and Releases  |  6/19/2009  | 
Companies will discuss specific identity governance challenges facing large enterprises that run their businesses on SAP during June 25 webinar
Citi Cross-Certifies With Trusted PKI Bridge
Products and Releases  |  6/18/2009  | 
Bank can now deliver identity credentialing services to companies seeking to do business with the aerospace and defense industry
Proginet Launches New Secure File Software
Products and Releases  |  6/18/2009  | 
Slingshot 1.6 comes with an Outlook plug-in that provides an enhanced capability to send, secure, and control attachments
Centrify Secures Access, Privileges On SUSE Linux Enterprise Servers
Products and Releases  |  6/18/2009  | 
Identity and access management solution earns certification from both IBM and Novell
Research: 88 Percent Of American Web Users Unable To Spot Phishing Sites
Products and Releases  |  6/18/2009  | 
Respondents were asked to identify which of two Web site images presented side by side was a fraudulent phishing site, VeriSign explains
Page 1 / 3   >   >>

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Everything You Need to Know About DNS Attacks
It's important to understand DNS, potential attacks against it, and the tools and techniques required to defend DNS infrastructure. This report answers all the questions you were afraid to ask. Domain Name Service (DNS) is a critical part of any organization's digital infrastructure, but it's also one of the least understood. DNS is designed to be invisible to business professionals, IT stakeholders, and many security professionals, but DNS's threat surface is large and widely targeted. Attackers are causing a great deal of damage with an array of attacks such as denial of service, DNS cache poisoning, DNS hijackin, DNS tunneling, and DNS dangling. They are using DNS infrastructure to take control of inbound and outbound communications and preventing users from accessing the applications they are looking for. To stop attacks on DNS, security teams need to shore up the organization's security hygiene around DNS infrastructure, implement controls such as DNSSEC, and monitor DNS traffic
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences. Cross site scripting (XSS) can be triggered by review volumes. This issue has been fixed in version 4.4.7.
PUBLISHED: 2023-05-26
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests ar...
PUBLISHED: 2023-05-26
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `ty...
PUBLISHED: 2023-05-26
Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was...
PUBLISHED: 2023-05-26
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file