Products and Releases

Content posted in July 2012
Page 1 / 3   >   >>
SSH Communications Security Launches Industry-First DLP Auditing Solution
Products and Releases  |  7/31/2012  | 
CryptoAuditor helps prevent data loss across encrypted secure shell, RDP, and SFTP traffic
NCP Releases Universal IPsec Clients For Android
Products and Releases  |  7/31/2012  | 
NCP Secure Android Client and Premium Android Client ensure secure access to corporate networks from all Android applications
BeyondTrust Launches PowerBroker Mobile
Products and Releases  |  7/31/2012  | 
New offering integrates context-aware management with vulnerability and patch information
Trend Micro Comments On Senate Cybersecurity Act
Products and Releases  |  7/31/2012  | 
Announced support for the legislation
Akamai Reports Second Quarter 2012 Financial Results
Products and Releases  |  7/31/2012  | 
Revenue for the second quarter of 2012 was $331 million
Websense Security Labs Launches New Intelligence Services And Tools
Products and Releases  |  7/31/2012  | 
Websense CSI On-Demand and Live services help organizations pinpoint attack methods, processes, and data targets
Centrify Announces Support For Apple Mac OS X Mountain Lion With Active Directory-Based Security And Management
Products and Releases  |  7/31/2012  | 
DirectControl for Mac enables admins to use Active Directory and Windows Group Policy to centrally control Mac systems in the workplace
AVG Updates Mobilation AntiVirus For Android
Products and Releases  |  7/30/2012  | 
Update features a new push notification that will alert users as they approach their monthly data limit
ReaSoft Network Firewall 3: Corporate Firewall With DLP Elements
Products and Releases  |  7/30/2012  | 
ReaSoft Network Firewall detects and prevents leakage of confidential information through e-mail, Webmail, ICQ, MSN, Internet communities, and other similar channels
Sophos Offers Free Antivirus App For Android Users
Products and Releases  |  7/30/2012  | 
Sophos Mobile Security automatically scans apps as users install them
Black Hat Survey: 36% Of Information Security Professionals Have Engaged In Retaliatory Hacking
Products and Releases  |  7/26/2012  | 
Some IS pros believe retaliatory attacks may discourage further attacks, according to nCircle
FireHost Selects Radware's Attack Mitigation System For Real-Time Network Attack Prevention
Products and Releases  |  7/25/2012  | 
FireHostwill use Radware's AMS as a key IT security solution across its network of secure cloud servers
Micro​soft/Trust​wave Expand ModSecurit​y To IIS And Nginx Servers
Products and Releases  |  7/25/2012  | 
ModSecurity is a free, open source Web application firewall
AccessData Releases Cyber Intelligence & Response Technology (CIRT) Version 2
Products and Releases  |  7/25/2012  | 
CIRT integrates network and computer forensics, malware analysis, large-scale data, auditing, and remediation
Appthority Unveils Hidden Security Risks Of Top Mobile Apps
Products and Releases  |  7/25/2012  | 
Report examines the security risks of the top 50 free iOS and Android apps
New RSA Service Helps Customers Detect And Shut Down Rogue Mobile Apps
Products and Releases  |  7/25/2012  | 
RSA FraudAction Anti Rogue App Service helps organizations discover fraudulent mobile apps that are leveraging customer brands to infect end users or steal credentials
Trend Micro Releases Security Roundup Report For Q2 2012
Products and Releases  |  7/25/2012  | 
Increasingly targeted and personalized attacks led to more than 140 million attacks that were blocked by Trend Micro against small businesses in the first half of the year
Symantec Names New President And CEO
Products and Releases  |  7/25/2012  | 
Steve Bennett, chairman of Symantec board, named president and chief executive officer; Dan Schulman appointed lead independent director
Radware's Attack Mitigation Black Belt Challenge Reveals IT Professionals' Strengths And Weaknesses Of Top Security Threats
Products and Releases  |  7/25/2012  | 
Pinpoints leading areas of knowledge that IT managers need to improve upon to enhance their attack mitigation proficiency
New Websense CyberSecurity Intelligence Services Provide Sandboxing, Forensics And Proactive Training To Combat Threats
Products and Releases  |  7/25/2012  | 
Websense CSI On-Demand and Live services help organizations pinpoint attack methods, processes, and data targets
Microsoft Security Toolkit Delivers New BlueHat Prize Defensive Technology
Products and Releases  |  7/25/2012  | 
EMET 3.5 makes it more difficult for attackers to exploit vulnerabilities and gain system access
SSH Communications Security Launches CryptoAuditor: Minimally-Invasive Enterprise Privileged User Access Auditing Solution
Products and Releases  |  7/25/2012  | 
Helps prevent data loss across encrypted secure shell, RDP and SFTP traffic with inline, real-time and transparent audit capabilities
GFI Survey Finds 12% of Consumers Would Use Mobile Location-Based Tracking To Keep Tabs On Their Spouses
Products and Releases  |  7/24/2012  | 
Location tracking also attractive to parents, with one in three saying they would use the feature to snoop on their teen’s whereabouts
HITRUST Expands Cybersecurity Center With Launch Of First Cyber Threat Analysis Service For Healthcare Industry
Products and Releases  |  7/24/2012  | 
Service is a new component of the recently announced HITRUST Cybersecurity Incident Response and Coordination Center
Analysis Of The Mobile Endpoint Security Products Market
Products and Releases  |  7/24/2012  | 
Report examines drivers and restraints for growth, pricing, distribution, and demand
VSS Monitoring Introduces New Network Packet Brokers To Enable Complete Networkwide Visibility And Performance
Products and Releases  |  7/24/2012  | 
vBroker appliances expand the capacity and interface flexibility of its packet broker solutions
GFI VIPRE Mobile Security Premium Now Available For Android Devices
Products and Releases  |  7/24/2012  | 
New app enables users to defend smartphones and tablets from viruses, monitor kids’ mobile activity, back up data, and remotely lock and wipe lost or stolen devices
Maxim's Security Manager Ensures Smart Grid Infrastructure Security
Products and Releases  |  7/24/2012  | 
MAX36025 adds secure encryption to critical points of data aggregation within the smart grid
Q2 2012 FireHost Web Application Attack Report Shows Sharp Rise In SQL Injections
Products and Releases  |  7/24/2012  | 
From April to June 2012, the Web applications, databases, and websites of FireHost’s customers were protected from a total of 17 million cyberattacks
Qualys Announces General Availability Of Its Dynamic Asset Tagging And Management Technology
Products and Releases  |  7/24/2012  | 
Technology enables customers to identify, categorize, and manage large numbers of assets in highly dynamic IT environments
HiSoftware And AIIM Survey Highlights Gaps In SharePoint Content Security
Products and Releases  |  7/24/2012  | 
The struggle between the open-nature of SharePoint and the need to secure sensitive data is clear in the reactions from respondents
WatchDox, Ponemon Institute Expose Enterprise Document Security Risks
Products and Releases  |  7/24/2012  | 
Study examines state of document-centric security in today’s corporate environment; identifies top risks
Context Presents 'Breaking .NET Through Serialization' At Black Hat USA
Products and Releases  |  7/24/2012  | 
Serialization vulnerabilities can lead to data disclosure or remote code execution, warns Context in white paper published today
GFI Software Launches GFI LanGuard 2012
Products and Releases  |  7/24/2012  | 
Solution includes combines vulnerability scanning, patch management, and network and software auditing
Novell Makes BYOD Enterprise Ready
Products and Releases  |  7/24/2012  | 
ZENworks Mobile Management automates the process of enrolling new devices
Avecto Reports Significant Growth Since Launch, Expands North America Presence
Products and Releases  |  7/23/2012  | 
Avecto closed out the year having significantly expanded operations in North America and Europe
Emulex OneConnect Network Xceleration Solution Provides Increased Performance With New Release Of Suricata
Products and Releases  |  7/23/2012  | 
FastStack Sniffer 10G provides greater vulnerability protection with lower packet drop rates
Microsoft Dynamics CRM Online Launches Trust Center
Products and Releases  |  7/23/2012  | 
Web site provides in-depth information about privacy and security practices for Microsoft Dynamics CRM Online service
New Market Research Offers Overview Of Global Intrusion Prevention System
Products and Releases  |  7/23/2012  | 
TechNavio's analysts forecast market to grow at a CAGR of 16.2 percent over the period 2011-2015
Research Finds 80 Percent Of Companies Do Not Use The Cloud Services They Want Due To Security Fears
Products and Releases  |  7/20/2012  | 
Meantime, 70 percent of companies would use these services if they were as robust as internal tools, according to Varonis Systems
Trend Micro Upgrades Mobile Device Management With Security And App Controls
Products and Releases  |  7/20/2012  | 
TMMS 8.0 enhances the enforcement of existing password and encryption policies as well as provides more granular remote wipe capabilities
Bayshore Networks Announces General Availability Of SingleKey V5.0
Products and Releases  |  7/20/2012  | 
Upgrades include advanced application behavior profiling
Norman Rolls Out New Version Of Malware Analyzer G2
Products and Releases  |  7/20/2012  | 
Norman Malware Analyzer G2 provides Hybrid SandBoxing
Black Hat Partners With The Electronic Frontier Foundation To Support Researchers At Black Hat USA 2012
Products and Releases  |  7/20/2012  | 
EFF has been providing legal advice to security researchers at Black Hat since 2008
Corero Network Security Launches ReputationWatch For Real-Time IP Address Blocking Of DDoS Attacks
Products and Releases  |  7/20/2012  | 
ReputationWatch identifies and blocks access to bad IP addresses in real time
GFI Software And OPSWAT Bring Easy-To-Deploy, Advanced Malware Analysis To The Enterpris
Products and Releases  |  7/20/2012  | 
Preconfigured sandbox appliance helps businesses combat the growing threat from advanced persistent threats and targeted cyberattacks
Palo Alto Networks Announces Pricing Of Initial Public Offering
Products and Releases  |  7/20/2012  | 
Pricing of IPO offering of 6,200,000 shares of common stock at $42 per share
CareerBuilder’s IT Mid-Year Job Forecast Points To Steady Hiring Picture In Back Half Of 2012
Products and Releases  |  7/19/2012  | 
Fifty-five percent of IT employers reported they are planning to hire full-time, permanent staff
BartVPN.com, A Guard Of Your Privacy, Launched
Products and Releases  |  7/19/2012  | 
Bart VPN guarantees its users total Internet anonymity
SOTI Offers Advanced Management And Security For Android Devices
Products and Releases  |  7/19/2012  | 
Currently, Android provides limited management and security APIs for MDM vendors to leverage
Page 1 / 3   >   >>


Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19279
PUBLISHED: 2018-11-14
PRIMX ZoneCentral before 6.1.2236 on Windows sometimes leaks the plaintext of NTFS files. On non-SSD devices, this is limited to a 5-second window and file sizes less than 600 bytes. The effect on SSD devices may be greater.
CVE-2018-19280
PUBLISHED: 2018-11-14
Centreon 3.4.x has XSS via the resource name or macro expression of a poller macro.
CVE-2018-19281
PUBLISHED: 2018-11-14
Centreon 3.4.x allows SNMP trap SQL Injection.
CVE-2018-17960
PUBLISHED: 2018-11-14
CKEditor 4.x before 4.11.0 allows user-assisted XSS involving a source-mode paste.
CVE-2018-19278
PUBLISHED: 2018-11-14
Buffer overflow in DNS SRV and NAPTR lookups in Digium Asterisk 15.x before 15.6.2 and 16.x before 16.0.1 allows remote attackers to crash Asterisk via a specially crafted DNS SRV or NAPTR response, because a buffer size is supposed to match an expanded length but actually matches a compressed lengt...