Products and Releases

Content posted in July 2010
Page 1 / 3   >   >>
Gigamon Announces Reseller Agreement With Fishnet
Products and Releases  |  7/30/2010  | 
Fishnet Security partners with Gigamon to offer modern IT security infrastructure
One In Three Top-Trending Search Topics Return Malicious Results, Finds Norton Study
Products and Releases  |  7/30/2010  | 
To counter these SEO poisoned threats, Norton has introduced Norton Safe Web Lite
RSA Survey: Only 2 Percent Of Organizations Have Suffered 'Serious' Incident Due To Mobile Use
Products and Releases  |  7/30/2010  | 
Security concerns associated with cloud computing also a top concern
U.S. Department of State Joins Other Key Government Agencies In Adopting PhoneFactor
Products and Releases  |  7/30/2010  | 
PhoneFactor provides authentication for remote workers
McAfee To Acquire tenCube
Products and Releases  |  7/30/2010  | 
tenCube is the provider of the WaveSecure mobile security service
Semtek Announces Open Licensing Of Cipher Hidden Encryption For Point Of Sale Devices
Products and Releases  |  7/28/2010  | 
ViVOtech will install Semtek's device-level encryption technologies in the ViVOpay line of products
Radiant Logic Enhances Contextual Security Via XACML
Products and Releases  |  7/28/2010  | 
RadiantOne VDS Context Edition 5.3 expands support for protocols
SPYRUS Announces Mac and Linux Support For High Assurance Encrypting Flash Drives
Products and Releases  |  7/28/2010  | 
Secured By SPYRUS technology implements the cryptographic base approved by the United States DoD to protect both unclassified information and most classified information
Symplified Unveils Enhancements To Identity And Access Management Platform
Products and Releases  |  7/28/2010  | 
Solution spans both cloud and on-premise user stores
Veracode Announces VERAFIED Mark Of Software Security
Products and Releases  |  7/28/2010  | 
New mark indicates software has been independently assessed for the CWE/SANS Top 25 Most Dangerous Software Errors
CoreTrace Launches User-Focused Application Whitelisting Tool
Products and Releases  |  7/28/2010  | 
BOUNCER 6.0 features intuitive administration and application intelligence
Cloud Security Alliance Announces New User Certification
Products and Releases  |  7/28/2010  | 
CCSK is already gaining broad industry support from numerous organizations
Open Security Foundation Offers Clearinghouse For Cloud Security Resources
Products and Releases  |  7/28/2010  | 
Cloutage website's goal is to provide unbiased knowledge and security resources on cloud computing so that organizations properly manage information security risks
SecureWorks And Dell Partner To Provide Information Security Services To SMB Market
Products and Releases  |  7/28/2010  | 
Services will be available by the end of the year
Panda Security, Defence Intelligence Help Bring Down Butterfly Botnet Author
Products and Releases  |  7/28/2010  | 
Two security firms identified Iserdo by analyzing the software behind the Mariposa botnet
Symantec Earnings Announcement -- Q1 2011
Products and Releases  |  7/28/2010  | 
Symantec achieved better than expected first quarter results in each of its key financial metrics
Hitachi ID Systems Releases Password Manager 7.0
Products and Releases  |  7/28/2010  | 
Authentication management solution has connectors to both on-premise and cloud-based applications
Microsoft, Adobe Collaborate To Protect Against Online Threats
Products and Releases  |  7/28/2010  | 
Microsoft Active Protections Program to include vulnerability information sharing from Adobe
Imperva Launches Hacker Intelligence Initiative
Products and Releases  |  7/28/2010  | 
HII researchers will conduct and release research on attacks
Sports Sites Are Top Targets In 'America's Most Wanted' List
Products and Releases  |  7/27/2010  | 
AVAST virus lab experts offer tips to stay protected during the summer
Cellcrypt Launches Secure Mobile Phone Conference Calling
Products and Releases  |  7/27/2010  | 
New service delivers encrypted calls and authenticates participants
New 2011 Consumer Solutions From Panda Security Utilize Power Of User Community For Lighter, Faster Protection
Products and Releases  |  7/27/2010  | 
New solutions feature 50 percent improvement in performance when running on Windows 7 environments
AT&T Extends Security Consulting Service With New Certification Program
Products and Releases  |  7/27/2010  | 
Program offers a single-service approach to assess the security posture of a business
Red Lambda's FireGrid UTM Network Security Software Debuts Today
Products and Releases  |  7/27/2010  | 
FireGrid UTM combines telemetry-based user and traffic identification with the massively scalable characteristics of its AppIron Grid Platform
eTelemetry's New Locate 5.0 Reduces Need For Manual IP Address
Products and Releases  |  7/27/2010  | 
Collaborative device registration system eliminates manual reporting of all devices
Redspin Delivers Expanded HIPAA Security Assessment Service For Healthcare Providers
Products and Releases  |  7/27/2010  | 
Redspin's HIPAA security assessment service helps healthcare providers answer fundamental questions regarding their information security, privacy and compliance programs
Commtouch Acquires Antivirus Division Of Authentium
Products and Releases  |  7/27/2010  | 
Command antivirus includes technology to protect against spyware, Trojan downloaders
AT&T Announces New Managed Security Features
Products and Releases  |  7/27/2010  | 
AT&T Security Center portal enables customers to perform a multitude of network management and administrative tasks
Webroot Unveils Webroot Internet Security Complete
Products and Releases  |  7/26/2010  | 
Webroot Internet Security Complete delivers four key benefits
dataguise Partners With Statscom
Products and Releases  |  7/26/2010  | 
Companies to deliver advanced security technology for federal government agencies
Security BSides Announces 2010 Speaker Line-Up
Products and Releases  |  7/26/2010  | 
Goal of Security BSides is to foster communication and collaboration while increasing the level of conversation
Accuvant And WhiteHat Security Forge Strategic Alliance
Products and Releases  |  7/26/2010  | 
The new partnership leverages WhiteHat Security's SaaS-based website vulnerability management platform and Accuvant LABS' application security services
PacketMotion Adds Internal Firewall Eliminator
Products and Releases  |  7/26/2010  | 
SourceSync extends UAM capabilities over the encrypted activities of privileged administrator
Ping Identity Calls For A Password Non-Proliferation Treaty
Products and Releases  |  7/26/2010  | 
Ping Identity CEO Andre Durand challenged a group of Internet industry leaders to work together to solve the protocol and architectural challenges of identity management in the cloud
SlimWare Utilities Launches 'Yelp For Apps'
Products and Releases  |  7/26/2010  | 
SlimWare Utilities products are available for a limited beta trial period at www.slimwareutilities.com
NitroSecurity: Stuxnet Is Tip Of SCADA Exploit Iceberg
Products and Releases  |  7/23/2010  | 
NitroSecurity recommends the following defensive best practices
SonicWALL Shareholders Approve Merger Agreement With Thoma Bravo And Ontario Teachers' Pension Plan
Products and Releases  |  7/23/2010  | 
Merger is expected to close today
Core Security Gains NIST SCAP Validation
Products and Releases  |  7/23/2010  | 
IMPACT Pro users can now export information in an XML format using SCAP standards
Short URLs In Spam Reach Historical Peak: MessageLabs Intelligence Report
Products and Releases  |  7/23/2010  | 
Average daily values also show a significant increase
SecureWorks Partners With MAD Security
Products and Releases  |  7/21/2010  | 
Companies will jointly offer a Secure Architecture for Federal Enterprises program to federal government agencies
Xceedium Inc. Names Glenn C. Hazard Chairman And CEO
Products and Releases  |  7/21/2010  | 
Hazard has a strong track record having served as CEO at both venture-funded and publicly held companies
Check Point Software Technologies Reports Record Second Quarter 2010 Financial Results
Products and Releases  |  7/21/2010  | 
Highlights include $261.1 million in total revenue, an increase of 17 percent
White Paper: Corporate Ignorance Of Phishing May Prove Catastrophic
Products and Releases  |  7/21/2010  | 
New Red Condor white paper examines the damage to corporate economics and reputation in the event of a phishing attack
Oracle Announces Identity Management 11G
Products and Releases  |  7/21/2010  | 
Oracle Identity Management 11g provides developers with shared services for identity administration and password management
Survey: German IT Security Spending Remains Constant
Products and Releases  |  7/20/2010  | 
German companies responding to economic crisis by economizing on IT security, says eleven
Large, Midsize, And Small Organizations Selecting Zscaler Cloud Security
Products and Releases  |  7/20/2010  | 
Integrated email and Web security replaces legacy appliances
Go Daddy, DynDNS.com And NamesBeyond Support DNSSEC-Signed .ORG Domain Names
Products and Releases  |  7/20/2010  | 
Registrar customers now can sign domain name with DNSSEC validation keys
World's Fastest Malware Analysis Appliance Debuts At Black Hat USA 2010
Products and Releases  |  7/20/2010  | 
ValidEdge Malware Intelligence System 1100 offers security response teams actionable intelligence
Protecode Launches System 4 For Identifying Open Source Content
Products and Releases  |  7/19/2010  | 
Scanning solution matches source code against a list of 450,000 open-source software projects
Keycorp Signs Agreement With Nice Actimize To Prevent Consumer And Business Fraud
Products and Releases  |  7/19/2010  | 
Technology to be used to further protect clients, enhance client experience
Page 1 / 3   >   >>


Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-9541
PUBLISHED: 2018-11-14
In avrc_pars_vendor_rsp of avcr_pars_ct.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Androi...
CVE-2018-9542
PUBLISHED: 2018-11-14
In avrc_pars_vendor_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 ...
CVE-2018-9543
PUBLISHED: 2018-11-14
In f2fs_format_utils.c WITH_BLKDISCARD is not defined, which may cause the data partition to not be wiped at factory reset, leading to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. ...
CVE-2018-9544
PUBLISHED: 2018-11-14
In register_app of btif_hd.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: A...
CVE-2018-9545
PUBLISHED: 2018-11-14
In BTA_HdRegisterApp of bta_hd_api.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-9. Androi...