Products and Releases

Content posted in July 2010
Page 1 / 3   >   >>
Gigamon Announces Reseller Agreement With Fishnet
Products and Releases  |  7/30/2010  | 
Fishnet Security partners with Gigamon to offer modern IT security infrastructure
One In Three Top-Trending Search Topics Return Malicious Results, Finds Norton Study
Products and Releases  |  7/30/2010  | 
To counter these SEO poisoned threats, Norton has introduced Norton Safe Web Lite
RSA Survey: Only 2 Percent Of Organizations Have Suffered 'Serious' Incident Due To Mobile Use
Products and Releases  |  7/30/2010  | 
Security concerns associated with cloud computing also a top concern
U.S. Department of State Joins Other Key Government Agencies In Adopting PhoneFactor
Products and Releases  |  7/30/2010  | 
PhoneFactor provides authentication for remote workers
McAfee To Acquire tenCube
Products and Releases  |  7/30/2010  | 
tenCube is the provider of the WaveSecure mobile security service
Semtek Announces Open Licensing Of Cipher Hidden Encryption For Point Of Sale Devices
Products and Releases  |  7/28/2010  | 
ViVOtech will install Semtek's device-level encryption technologies in the ViVOpay line of products
Radiant Logic Enhances Contextual Security Via XACML
Products and Releases  |  7/28/2010  | 
RadiantOne VDS Context Edition 5.3 expands support for protocols
SPYRUS Announces Mac and Linux Support For High Assurance Encrypting Flash Drives
Products and Releases  |  7/28/2010  | 
Secured By SPYRUS technology implements the cryptographic base approved by the United States DoD to protect both unclassified information and most classified information
Symplified Unveils Enhancements To Identity And Access Management Platform
Products and Releases  |  7/28/2010  | 
Solution spans both cloud and on-premise user stores
Veracode Announces VERAFIED Mark Of Software Security
Products and Releases  |  7/28/2010  | 
New mark indicates software has been independently assessed for the CWE/SANS Top 25 Most Dangerous Software Errors
CoreTrace Launches User-Focused Application Whitelisting Tool
Products and Releases  |  7/28/2010  | 
BOUNCER 6.0 features intuitive administration and application intelligence
Cloud Security Alliance Announces New User Certification
Products and Releases  |  7/28/2010  | 
CCSK is already gaining broad industry support from numerous organizations
Open Security Foundation Offers Clearinghouse For Cloud Security Resources
Products and Releases  |  7/28/2010  | 
Cloutage website's goal is to provide unbiased knowledge and security resources on cloud computing so that organizations properly manage information security risks
SecureWorks And Dell Partner To Provide Information Security Services To SMB Market
Products and Releases  |  7/28/2010  | 
Services will be available by the end of the year
Panda Security, Defence Intelligence Help Bring Down Butterfly Botnet Author
Products and Releases  |  7/28/2010  | 
Two security firms identified Iserdo by analyzing the software behind the Mariposa botnet
Symantec Earnings Announcement -- Q1 2011
Products and Releases  |  7/28/2010  | 
Symantec achieved better than expected first quarter results in each of its key financial metrics
Hitachi ID Systems Releases Password Manager 7.0
Products and Releases  |  7/28/2010  | 
Authentication management solution has connectors to both on-premise and cloud-based applications
Microsoft, Adobe Collaborate To Protect Against Online Threats
Products and Releases  |  7/28/2010  | 
Microsoft Active Protections Program to include vulnerability information sharing from Adobe
Imperva Launches Hacker Intelligence Initiative
Products and Releases  |  7/28/2010  | 
HII researchers will conduct and release research on attacks
Sports Sites Are Top Targets In 'America's Most Wanted' List
Products and Releases  |  7/27/2010  | 
AVAST virus lab experts offer tips to stay protected during the summer
Cellcrypt Launches Secure Mobile Phone Conference Calling
Products and Releases  |  7/27/2010  | 
New service delivers encrypted calls and authenticates participants
New 2011 Consumer Solutions From Panda Security Utilize Power Of User Community For Lighter, Faster Protection
Products and Releases  |  7/27/2010  | 
New solutions feature 50 percent improvement in performance when running on Windows 7 environments
AT&T Extends Security Consulting Service With New Certification Program
Products and Releases  |  7/27/2010  | 
Program offers a single-service approach to assess the security posture of a business
Red Lambda's FireGrid UTM Network Security Software Debuts Today
Products and Releases  |  7/27/2010  | 
FireGrid UTM combines telemetry-based user and traffic identification with the massively scalable characteristics of its AppIron Grid Platform
eTelemetry's New Locate 5.0 Reduces Need For Manual IP Address
Products and Releases  |  7/27/2010  | 
Collaborative device registration system eliminates manual reporting of all devices
Redspin Delivers Expanded HIPAA Security Assessment Service For Healthcare Providers
Products and Releases  |  7/27/2010  | 
Redspin's HIPAA security assessment service helps healthcare providers answer fundamental questions regarding their information security, privacy and compliance programs
Commtouch Acquires Antivirus Division Of Authentium
Products and Releases  |  7/27/2010  | 
Command antivirus includes technology to protect against spyware, Trojan downloaders
AT&T Announces New Managed Security Features
Products and Releases  |  7/27/2010  | 
AT&T Security Center portal enables customers to perform a multitude of network management and administrative tasks
Webroot Unveils Webroot Internet Security Complete
Products and Releases  |  7/26/2010  | 
Webroot Internet Security Complete delivers four key benefits
dataguise Partners With Statscom
Products and Releases  |  7/26/2010  | 
Companies to deliver advanced security technology for federal government agencies
Security BSides Announces 2010 Speaker Line-Up
Products and Releases  |  7/26/2010  | 
Goal of Security BSides is to foster communication and collaboration while increasing the level of conversation
Accuvant And WhiteHat Security Forge Strategic Alliance
Products and Releases  |  7/26/2010  | 
The new partnership leverages WhiteHat Security's SaaS-based website vulnerability management platform and Accuvant LABS' application security services
PacketMotion Adds Internal Firewall Eliminator
Products and Releases  |  7/26/2010  | 
SourceSync extends UAM capabilities over the encrypted activities of privileged administrator
Ping Identity Calls For A Password Non-Proliferation Treaty
Products and Releases  |  7/26/2010  | 
Ping Identity CEO Andre Durand challenged a group of Internet industry leaders to work together to solve the protocol and architectural challenges of identity management in the cloud
SlimWare Utilities Launches 'Yelp For Apps'
Products and Releases  |  7/26/2010  | 
SlimWare Utilities products are available for a limited beta trial period at www.slimwareutilities.com
NitroSecurity: Stuxnet Is Tip Of SCADA Exploit Iceberg
Products and Releases  |  7/23/2010  | 
NitroSecurity recommends the following defensive best practices
SonicWALL Shareholders Approve Merger Agreement With Thoma Bravo And Ontario Teachers' Pension Plan
Products and Releases  |  7/23/2010  | 
Merger is expected to close today
Core Security Gains NIST SCAP Validation
Products and Releases  |  7/23/2010  | 
IMPACT Pro users can now export information in an XML format using SCAP standards
Short URLs In Spam Reach Historical Peak: MessageLabs Intelligence Report
Products and Releases  |  7/23/2010  | 
Average daily values also show a significant increase
SecureWorks Partners With MAD Security
Products and Releases  |  7/21/2010  | 
Companies will jointly offer a Secure Architecture for Federal Enterprises program to federal government agencies
Xceedium Inc. Names Glenn C. Hazard Chairman And CEO
Products and Releases  |  7/21/2010  | 
Hazard has a strong track record having served as CEO at both venture-funded and publicly held companies
Check Point Software Technologies Reports Record Second Quarter 2010 Financial Results
Products and Releases  |  7/21/2010  | 
Highlights include $261.1 million in total revenue, an increase of 17 percent
White Paper: Corporate Ignorance Of Phishing May Prove Catastrophic
Products and Releases  |  7/21/2010  | 
New Red Condor white paper examines the damage to corporate economics and reputation in the event of a phishing attack
Oracle Announces Identity Management 11G
Products and Releases  |  7/21/2010  | 
Oracle Identity Management 11g provides developers with shared services for identity administration and password management
Survey: German IT Security Spending Remains Constant
Products and Releases  |  7/20/2010  | 
German companies responding to economic crisis by economizing on IT security, says eleven
Large, Midsize, And Small Organizations Selecting Zscaler Cloud Security
Products and Releases  |  7/20/2010  | 
Integrated email and Web security replaces legacy appliances
Go Daddy, DynDNS.com And NamesBeyond Support DNSSEC-Signed .ORG Domain Names
Products and Releases  |  7/20/2010  | 
Registrar customers now can sign domain name with DNSSEC validation keys
World's Fastest Malware Analysis Appliance Debuts At Black Hat USA 2010
Products and Releases  |  7/20/2010  | 
ValidEdge Malware Intelligence System 1100 offers security response teams actionable intelligence
Protecode Launches System 4 For Identifying Open Source Content
Products and Releases  |  7/19/2010  | 
Scanning solution matches source code against a list of 450,000 open-source software projects
Keycorp Signs Agreement With Nice Actimize To Prevent Consumer And Business Fraud
Products and Releases  |  7/19/2010  | 
Technology to be used to further protect clients, enhance client experience
Page 1 / 3   >   >>


High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1659
PUBLISHED: 2019-02-21
A vulnerability in the Identity Services Engine (ISE) integration feature of Cisco Prime Infrastructure (PI) could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack against the Secure Sockets Layer (SSL) tunnel established between ISE and PI. The vulnerability is due to...
CVE-2019-8983
PUBLISHED: 2019-02-21
MDaemon Webmail 14.x through 18.x before 18.5.2 has XSS (issue 1 of 2).
CVE-2019-8984
PUBLISHED: 2019-02-21
MDaemon Webmail 14.x through 18.x before 18.5.2 has XSS (issue 2 of 2).
CVE-2018-20122
PUBLISHED: 2019-02-21
The web interface on FASTGate Fastweb devices with firmware through 0.00.47_FW_200_Askey 2017-05-17 (software through 1.0.1b) exposed a CGI binary that is vulnerable to a command injection vulnerability that can be exploited to achieve remote code execution with root privileges. No authentication is...
CVE-2018-6687
PUBLISHED: 2019-02-21
Loop with Unreachable Exit Condition ('Infinite Loop') in McAfee GetSusp (GetSusp) 3.0.0.461 and earlier allows attackers to DoS a manual GetSusp scan via while scanning a specifically crafted file . GetSusp is a free standalone McAfee tool that runs on several versions of Microsoft Windows.