Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2015
<<   <   Page 2 / 2
Ping Identity Unveils Identity Defined Security Platform to Enable Fluid and Trusted Interactions in a Connected, Mobile World
Products and Releases  |  6/8/2015  | 
New Features Include Multi-factor Authentication Support for Apple Watch, Enterprise Grade Identity as a Service and Comprehensive Web Access Management and API Security Solution
Menlo Security Emerges From Stealth to Eliminate Threat of Malware, Adds $25 Million in Series B Funding
Products and Releases  |  6/8/2015  | 
Industrys first Isolation Platform already trusted by Fortune 500 companies, now ready for global market
Symantec Announces Extensive New Cloud Offering
Products and Releases  |  6/8/2015  | 
Symantec DLP 14 Provides CIOs with More Visibility and Control over Company Data Strengthened Partnership with Box Further Protects Information in the Cloud
Terbium Labs Launches the First Data Intelligence System that Instantly Locates Stolen Data on the Dark Web
Products and Releases  |  6/5/2015  | 
Matchlight Automatically Identifies Business-Critical Data on the Dark Web Closes the Breach Detection Gap and Minimizes the Damage, Loss and Risk Caused by a Data Breach
FireMon Adds Industry Veteran as President and COO
Products and Releases  |  6/5/2015  | 
Jim Lewandowski to spearhead customer-facing operations and programs to drive rapid growth
Akamai and Trustwave Form Strategic Alliance to Protect Businesses from Online Threats
Products and Releases  |  6/5/2015  | 
First Phase of Partnership Offers Broad Set of Security Solutions to Help Customers Address Changing Threat Landscape
Niara Launches from Stealth, Unveils Comprehensive Security Intelligence Solution for Advanced Threat Discovery and Incident Response
Products and Releases  |  6/5/2015  | 
Niara integrates big data analytics and forensics to discover, investigate and respond to sophisticated, hidden threats within an organization
LastPass to Offer Affordable Password Management Packages for Universities as part of Internet2 NET+ Portfolio
Products and Releases  |  6/4/2015  | 
LastPass helps students and staff remember their passwords and login securely to every web account
ERPScan Security Monitoring Suite Now Supports Integration With IBM QRadar SIEM
Products and Releases  |  6/4/2015  | 
Vulnerabilities, misconfigurations and security events detected by ERPScan Security Monitoring Suite in SAP and Oracle enterprise systems can now be continuously managed in IBM QRadar SIEM.
Visa and FireEye Join Forces to Help Merchants, Financial Institutions Defend Against Targeted Attacks on Consumer Payment Data
Products and Releases  |  6/4/2015  | 
New Visa and FireEye cyber watch program will provide advanced cyber protection capabilities for merchants of all sizes
OWASPs AppSec USA 2015 Announces Keynote Speakers Yahoo CISO, Microsoft MVP
Products and Releases  |  6/3/2015  | 
Yahoo CISO and Microsoft MVP Join Web Application Experts Worldwide to Examine State of Security at Leading AppSec Conference in San Francisco Sept. 22-25
Report: 70 Percent of Consumers Are Losing Faith in Passwords, Want Additional Account Security
Products and Releases  |  6/3/2015  | 
TeleSign launches Turn It On, featuring the ultimate guide to two-factor authentication (2FA)
Cyphort Announces $30 Million in Series C Funding
Products and Releases  |  6/1/2015  | 
<<   <   Page 2 / 2

NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping bec...
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ...
PUBLISHED: 2021-01-21
OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attacker...
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the...
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192427.