Products and Releases

Content posted in June 2012
Page 1 / 2   >   >>
Network Barometer Report 2012: Nearly Half of All Enterprise Networks Will be Obsolete Within Five Years
Products and Releases  |  6/29/2012  | 
Trends including BYOD, video and virtualization are shortening network life expectancy
Webroot and F5 Networks Join Forces to Enhance Application Security for Enterprise Customers Worldwide
Products and Releases  |  6/29/2012  | 
Integration of Webroot's IP Reputation Services to power F5's IP Intelligence offering
CSS Uncovers SCEP Vulnerability For Mobile Devices In The Enterprise
Products and Releases  |  6/29/2012  | 
Simple Certificate Enrollment Protocol (SCEP) does not strongly authenticate certificate requests
InfoExpress Enhances NAC Support For BYOD With Support For More Mobile Devices
Products and Releases  |  6/29/2012  | 
NAC vendor offers apps for Android, iOS, other mobile platforms
SecureState's Research & Innovation Team to Release Smart Meter Hacking Framework
Products and Releases  |  6/29/2012  | 
World's first open source framework allows individuals to test for vulnerabilities in Smart Meters
IID Reports 12 Percent of Fortune 500 Still Infected With DNSChanger Malware
Products and Releases  |  6/28/2012  | 
New infographic shows need for collective intelligence to stop malware from causing millions of dollars in damage annually
Radiant Logic Releases Federated Identity Service Based on Virtualization
Products and Releases  |  6/28/2012  | 
RadiantOne VDS 6 Creates a Virtual Identity Hub for SSO, Cloud, and Federation Initiatives
NQ Mobile Scientists Reveal Ground-Breaking New Malware Detection Method
Products and Releases  |  6/28/2012  | 
New RiskRanker system will proactively seek out and identify risky apps in the marketplace even before they are downloaded to mobile devices
Manhattan U.S. Attorney, FBI Assistant Director In Charge Announce 24 Arrests In Eight Countries As Part of International Cyber Crime Takedown
Products and Releases  |  6/26/2012  | 
Two-Year FBI Undercover 'Carding' Operation Protected Over 400,000 Potential Cyber Crime Victims and Prevented Over $205 Million in Losses
Howard A. Schmidt, Former White House Cybersecurity Coordinator, Joins Qualys Board of Directors
Products and Releases  |  6/26/2012  | 
Distinguished global authority on Internet security and critical infrastructure to bring public sector expertise and help expand industry collaboration
TrustPort Rolls Out New AV
Products and Releases  |  6/26/2012  | 
TrustPort launches new enhanced product versions for online security
Silicon Valley Law Group Prevails, Bank Settles Wire Transfer Fraud Litigation
Products and Releases  |  6/26/2012  | 
Cyber thieves breached security, depleted funds from bank customer’s account
Survey: Highly Sensitive Information Sent Via Email Lacks Critical Security Controls
Products and Releases  |  6/25/2012  | 
For 80% of respondents, the only thing standing between an attacker and this email communication is a username and password, according to PhoneFactor
DARPA Awards Invincea $21.4 Million Contract To Create Secure Android Smartphones And Tablets For U.S. Army
Products and Releases  |  6/25/2012  | 
Secure Android phones and tablets currently in field test in Afghanistan by U.S. Army brigade
Metaforic Extends Software Immune System To Protect Applications Running On Apple iOS Devices
Products and Releases  |  6/22/2012  | 
Metaforic empowers developers to create secure and tamper-proof applications
VASCO Announces DIGIPASS KEY 202 And CertiID Suite 3.4.3
Products and Releases  |  6/22/2012  | 
DIGIPASS CertiID provides digital signatures for user authentication and transaction security
Check Point Survey Reveals A Generation Gap In Computer Security
Products and Releases  |  6/22/2012  | 
More than three-quarters of Gen Y respondents do not follow security best practices
Redspin Pioneers Advanced Persistent Threat (APT) Assessment Service
Products and Releases  |  6/22/2012  | 
New service uses multiple attack vectors and shared knowledge assessments
Voltage Security Extends End-To-End Email Encryption To iOS And Android Devices
Products and Releases  |  6/22/2012  | 
Voltage SecureMail Mobile Edition allows mobile users to read encrypted messages sent from Voltage-enabled desktops, gateways, enterprise applications and other mobile devices
Wurldtech Provides Schneider Electric With Achilles Lab Accreditation
Products and Releases  |  6/22/2012  | 
Achilles Communication Certification provides security benchmark for embedded devices used in industrial infrastructure and other mission-critical connected devices
13 Security Tips To Combat Mobile Device Threats To Healthcare
Products and Releases  |  6/22/2012  | 
Risks to patient data growing, as cited by Department of Homeland Security
Dataguise And MapR Partner To Protect Big Data
Products and Releases  |  6/22/2012  | 
Dataguise will offer its DgHadoopT solution to protect sensitive data aggregated in Hadoop deployments
One In Five Financial Firms 'Don't Know' Whether They Have Suffered Data Breaches
Products and Releases  |  6/22/2012  | 
Study from PwC and Iron Mountain shows worrying level of complacency among Europe's financial services firms
AutoTrader.com Launches Privacy Shield Nationwide
Products and Releases  |  6/22/2012  | 
Privacy Shield helps private sellers keep their personal contact information private
nCircle Expands Vulnerability Scanning For SCADA Devices
Products and Releases  |  6/22/2012  | 
nCircle Suite360 now covers vulnerabilities from six more equipment suppliers
BlueCat Networks Partners With Thales To Deliver Ultra Secure DNS Security Extensions
Products and Releases  |  6/22/2012  | 
New BlueCat Networks appliance models integrate with Thales nShield HSM
The Global Cyber Warfare Market 2011-2021 - Competitive Landscape And Strategic Insights: Market Profile
Products and Releases  |  6/22/2012  | 
Report shows leading cyberwarfare market segments
Gemalto Launches Protiva Defender Suite, an End-To-End Identity And Access Solution For Law Enforcement Officials
Products and Releases  |  6/21/2012  | 
Provicta Defender Suite addresses increasing industry regulations mandating strong digital identity verification
MineralTree Raises $6.3 Million To Accelerate Growth
Products and Releases  |  6/21/2012  | 
Fidelity Growth Partners India leads financing round
Mocana Rolls Out Software, Services For Securing 'The Internet Of Things'
Products and Releases  |  6/21/2012  | 
Mocana Security DetailT comprises four comprehensive security suites
Latest Erasure Solutions Launch Preemptive Strike Against Data Breaches
Products and Releases  |  6/20/2012  | 
Blancco 5 data erasure software and centralized Management Console supports fast, simple and complete data removal from electronic devices
SafeNet And Pitney Bowes Collaborate On The First Cryptographically Secured Digital Mailbox In The Cloud
Products and Releases  |  6/20/2012  | 
By selecting SafeNet as its security technology partner, Volly's digital mailbox content can securely reside in the cloud
HP Rolls Out Mobile Security Products, Services For SMBs
Products and Releases  |  6/20/2012  | 
New offerings also include financing and training programs
Bluebox, New Mobile Security Startup, Receives Funding
Products and Releases  |  6/20/2012  | 
Round led by Andreessen Horowitz
LANDesk Acquires Wavelink To Redefine Mobility Management
Products and Releases  |  6/20/2012  | 
Acquisition is the second for LANDesk in 2012
Dave DeWalt Joins FireEye As Chairman Of The Board
Products and Releases  |  6/19/2012  | 
DeWalt is former president and chief executive officer of McAfee
StrikeForce Makes Multifactor Authentication And Keystroke Encryption Available To Cloud Vendors
Products and Releases  |  6/19/2012  | 
StrikeForce Technologies announces a solution designed to improve the security of private and public clouds
NT OBJECTives Releases New NTOEnterprise For Web Application Vulnerability Program Management
Products and Releases  |  6/19/2012  | 
NTOEnterprise 2.0 enables organizations to plan, manage, control, and measure thousands of Web application scans
Lumeta Announces Device Profiling Supporting BYOD Security Initiatives
Products and Releases  |  6/19/2012  | 
Latest release supports comprehensive profiling across more than 26,000 devices
Symantec Survey Reveals Online File Sharing Poses Great Security Risks To SMBs
Products and Releases  |  6/19/2012  | 
SMB employees are increasingly adopting unmanaged, personal-use online file sharing solutions without permission from IT
'Verizon 2012 Data Breach Investigations Report' Now Available As Free iBook
Products and Releases  |  6/18/2012  | 
Users can download DBIR on an iPad with iBooks 2 or on a computer with iTunes
Vormetric Prevents Big Data Toxic Leaks
Products and Releases  |  6/18/2012  | 
Vormetric Encryption secures structured and unstructured information stored in Big Data platforms
Sourcefire Expands Portfolio To Address Malware Targeting Mobile Devices
Products and Releases  |  6/18/2012  | 
FireSIGHT and FireAMP Mobile identify mobile devices connecting to a network
Kevin Mitnick Partners With KnowBe4
Products and Releases  |  6/18/2012  | 
Mitnick has taken the role of KnowBe4's Chief Hacking Officer
Black Hat Releases Complete Event Schedule
Products and Releases  |  6/14/2012  | 
Among the news breaking will be 36 tools, 17 0-days, and 49 live on-stage demonstrations
BT Simplifies Big Data And Security Challenges With New Visualization Service
Products and Releases  |  6/14/2012  | 
BT Assure Analytics helps organizations to collect, arrange, and evaluate big data sets
American Bar Association Endorses Chubb's Cyber Liability Insurance Product
Products and Releases  |  6/14/2012  | 
Covers losses that typically are not covered by a lawyer's professional liability policy
CloudPassage Introduces Halo GhostPorts SMS
Products and Releases  |  6/13/2012  | 
Secure saccess control for any application on any server in any cloud using any mobile phone as the authentication device
CloudLock Unveils The Industry's First PII And PCI Compliance Scan For Google Drive
Products and Releases  |  6/12/2012  | 
Ability to find, classify, and protect extremely sensitive PII data was a top CloudLock feature request
Panda Security Launches Panda Cloud Office Protection Advanced
Products and Releases  |  6/12/2012  | 
Anti-spam protection stops unwanted email and manages corporate email effectively
Page 1 / 2   >   >>


Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19333
PUBLISHED: 2018-11-17
pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.
CVE-2018-19340
PUBLISHED: 2018-11-17
Guriddo Form PHP 5.3 has XSS via the demos/jqform/defaultnodb/default.php OrderID, ShipName, ShipAddress, ShipCity, ShipPostalCode, ShipCountry, Freight, or details parameter.
CVE-2018-19327
PUBLISHED: 2018-11-17
An issue was discovered in JTBC(PHP) 3.0.1.7. aboutus/manage.php?type=action&action=add allows CSRF.
CVE-2018-19328
PUBLISHED: 2018-11-17
LAOBANCMS 2.0 allows install/mysql_hy.php?riqi=../ Directory Traversal.
CVE-2018-19329
PUBLISHED: 2018-11-17
GreenCMS v2.3.0603 allows remote authenticated administrators to delete arbitrary files by modifying a base64-encoded pathname in an m=admin&c=media&a=delfilehandle&id= call, related to the m=admin&c=media&a=restorefile delete button.