Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in July 2012
<<   <   Page 2 / 3   >   >>
Check Point Taps Power Of Virtualization To Simplify Security For Private Clouds
Products and Releases  |  7/19/2012  | 
Allows businesses to consolidate security gateways onto a single appliance or open server
Mocana NanoSSH Toolkit Secures New Out-Of-Band Management Products From Communication Devices
Products and Releases  |  7/19/2012  | 
Software allows for support of multiple SSH sessions
WISeKey Releases WISeID 4.0 "Accountable Identity" With Face Recognition
Products and Releases  |  7/19/2012  | 
WISeID 4.0 for access authentication
F5 Networks Announces Results For Third Quarter Of Fiscal 2012
Products and Releases  |  7/19/2012  | 
Revenue up quarter-over-quarter and year-over-year
Symantec Announces Mobile Security And Management Product Portfolio
Products and Releases  |  7/19/2012  | 
Updates to enable secure mobile email deployments, mobile application initiatives, and Bring Your Own Device programs
Black Hat Marks 15th Anniversary By Bringing Back Experts Who Presented 15 Years Ago
Products and Releases  |  7/19/2012  | 
Black Hat "futurist panel" brings together these industry veterans to discuss today's cutting-edge research and emergent technologies
ThreatMetrix Identifies Top Five Cybersecurity Threats Of Olympic Proportions
Products and Releases  |  7/19/2012  | 
ThreatMetrix has identified threats for consumers to be aware of during the Olympic Games
Veracode Outlines Security Risks Facing The Retail Industry
Products and Releases  |  7/18/2012  | 
Retail networks prone to attacks because of tendency to contain large amounts of sensitive customer data
One In 10 SMEs Have Suffered From A Data Hack
Products and Releases  |  7/18/2012  | 
Only 25% are very confident in their security measures
Europol To Lead International Cyber Security Protection Alliance Consultation Into The Future Of Cybercrime
Products and Releases  |  7/18/2012  | 
Alliance to pool intelligence from business, government, law enforcement, security agencies, and professionals
Solix Technologies Announces Free Data Masking Download
Products and Releases  |  7/18/2012  | 
Solix EDMS Data Masking Standard Edition can mask up to 10 columns of sensitive data across all non-production instances of a single enterprise application
Skybox Security Introduces Next-Generation Vulnerability Management Solution
Products and Releases  |  7/17/2012  | 
Skybox Risk Control 6.5 includes new nondisruptive Vulnerability Detector
Kaspersky Lab And Seculert Announce 'Madi,' A Newly Discovered Cyber-Espionage Campaign In The Middle East
Products and Releases  |  7/17/2012  | 
Madi is a computer network infiltration campaign that involves a malicious Trojan
Rapid7 Announces Latest Advancement To Metasploit Pro
Products and Releases  |  7/17/2012  | 
Extends integration with Rapid7’s vulnerability management product, Rapid7 Nexpose
Tom Cross Joins Lancope
Products and Releases  |  7/17/2012  | 
Prior to joining Lancope, Cross was part of the IBM X-Force Advanced Research team
SAFECode Releases Agile Security Guidance
Products and Releases  |  7/17/2012  | 
Best practice paper provides 'practical' lists of security-focused stories and security tasks
Webroot Adds Windows 8 Security
Products and Releases  |  7/16/2012  | 
Webroot SecureAnywhere now listed as compatible with Microsoft's OS
Azaleos Secures BYOD With New Cloud-based Mobile Device Management Service
Products and Releases  |  7/16/2012  | 
Azaleos Managed Mobile Device Management Service enables enterprises to centrally secure and control all leading mobile devices
Osterman Research Survey Finds Mobile Device Management Costs Are Soaring
Products and Releases  |  7/16/2012  | 
Among organizations that have not yet deployed an MDM solution, 32% will deploy one in 2013
nCircle Announces PureCloud Enterprise
Products and Releases  |  7/16/2012  | 
Scanning solution helps enterprises address common gaps in security visibility
Ensygnia Introduces On-Demand End-Point Security
Products and Releases  |  7/16/2012  | 
Appointed first global master distributor for Azuan Technologies New offer supports patented QR Code authentication process
Panda Security Launches Panda Cloud Antivirus 2.0
Products and Releases  |  7/16/2012  | 
Incorporates new features, such as a community-based firewall
Sophos Makes Unified Threat Management Complete By Adding Endpoint Security
Products and Releases  |  7/16/2012  | 
Sophos UTM 9 integrates gateway security and endpoint security in a single hardware or virtual box
Perimeter E-Security Introduces Archive Anywhere
Products and Releases  |  7/13/2012  | 
Enables email users to access and search their entire mailbox archive on virtually any device
PhoneFactor Adds OATH Passcode Option To Growing Authentication Suite
Products and Releases  |  7/13/2012  | 
Enables multifactor authentication using an OATH passcode generated by the PhoneFactor Mobile App
Panda Security Launches Panda Cloud Systems Management
Products and Releases  |  7/13/2012  | 
Solution designed to manage, monitor, and maintain computer networks
FBI: Three More Defendants Arrested In Canada, India, And U.S. For 'Carding' Crimes
Products and Releases  |  7/13/2012  | 
Total rises to 27 arrests worldwide
Commtouch Report Names Big Brands Misleadingly Utilized In The Distribution Of Malware
Products and Releases  |  7/12/2012  | 
Researchers name brands that were abused in various third-party email attacks
Charismathics Rolls Out PKI Middleware
Products and Releases  |  7/11/2012  | 
Release 5.0 includes numerous add-ons and updates
Data Locker Granted New Security Patent
Products and Releases  |  7/11/2012  | 
Patent covers Data Locker's methods for securing data
Skybox Security Survey Reveals Traditional Vulnerability Scanners Not Working
Products and Releases  |  7/11/2012  | 
Survey illustrated a major disconnect between the frequency and the breadth of vulnerability scanning actually conducted
Barracuda Networks Announces CEO Resignation, Commences CEO Search
Products and Releases  |  7/11/2012  | 
Dean Drako will continue to serve on the board of directors
Seculert Secures $5.35 Million In Additional Funding
Products and Releases  |  7/10/2012  | 
Norwest Venture Partners (NVP) led the round
Lewan & Associates Partners With StillSecure To Offer Full Suite Of Managed Security Services
Products and Releases  |  7/10/2012  | 
Lewan & Associates will be reselling StillSecure’s managed security services for on-premise and cloud-based setups
Symantec Announces New Cloud Capabilities As Part Of MSP Strategy
Products and Releases  |  7/10/2012  | 
Includes a new console designed to simplify the management and monitoring of security and backup solutions
Verisign Awards $400,000 For Mobile Network Security And Downscaling Registries Projects
Products and Releases  |  7/10/2012  | 
Two research teams each awarded $200,000 to conduct research aimed at strengthening Internet infrastructure
SIA Backs Biometrics To Improve Integrity Of Medicare, Medicaid Programs
Products and Releases  |  7/10/2012  | 
Comments submitted to Senate Finance Committee
Travelers Left Behind More Than 8,000 Mobile Devices At Top U.S. Airports
Products and Releases  |  7/10/2012  | 
Two of seven answered that they found most missing devices in restrooms, according to Credant
Websense Delivers 10 New Advanced Malware and Data Theft Defenses With Threat Dashboard, Forensics And Sandboxing
Products and Releases  |  7/10/2012  | 
Websense TRITON solution provides data-aware defenses necessary to prevent today's advanced attacks that lead to data theft
Total Defense Acquires Cloud Security Company
Products and Releases  |  7/9/2012  | 
Acquires iSheriff
Zeus Malware Strain Infecting 1 In 50 PCs
Products and Releases  |  7/9/2012  | 
One of the main changes to this new Zeus variant is the way it encrypts its configuration file
F5 Offers Free Vulnerability Assessment Scans In Partnership With Cenzic And WhiteHat Security
Products and Releases  |  7/9/2012  | 
Program is designed to help enterprises accelerate adoption of Web application security best practices
Trend Micro Provides An Integrated Secure Hosted Solution For SMBs
Products and Releases  |  7/9/2012  | 
Integrates Worry-Free Business Security Services into the Windows Server 2012 Essentials console
HBGary Joins IBM's Security Intelligence Partner Program
Products and Releases  |  7/9/2012  | 
Security Intelligence Partner Program allows partners to integrate with IBM’s QRadar Security Intelligence Platform
Cybercriminals Continue To Spam Victims While Posing As Popular Companies, According To GFI Software
Products and Releases  |  7/6/2012  | 
Internet users are urged to monitor for red flags in any unsolicited email messages and to exercise caution when clicking on unknown links
McAfee Releases DNSChanger Fix; Industry First
Products and Releases  |  7/5/2012  | 
DNSChanger Trojan disables antivirus and regular software updates
Men And Women Checking Email Everywhere Says New Survey By Good Technology
Products and Releases  |  7/3/2012  | 
Survey shows U.S. work habits have changed
DataMotion Announces Technology That Enables Easy And Secure Doctor-Patient Email Interaction
Products and Releases  |  7/3/2012  | 
Solution takes a new approach to digital certificates and S/MIME messaging
Despite Increased Corporate Focus On Risk, Processes Around Risk Management Remain Largely Manual, KPMG Poll Finds
Products and Releases  |  7/3/2012  | 
Respondents were largely from industry sectors that are highly regulated and most heavily dependent on technology
OpenDNS Introduces Enterprise Insights
Products and Releases  |  7/3/2012  | 
Enterprise security solution blocks malware and botnet communications
<<   <   Page 2 / 3   >   >>

NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. All users of pysaml2 that need to validate signed SAML documents are impacted. The vulnerability is a variant of XML Signature wrapping bec...
PUBLISHED: 2021-01-21
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 has an improper verification of cryptographic signature vulnerability. Users of pysaml2 that use the default CryptoBackendXmlSec1 backend and need to verify signed SAML documents are impacted. PySAML2 does not ...
PUBLISHED: 2021-01-21
OnlineVotingSystem is an open source project hosted on GitHub. OnlineVotingSystem before version 1.1.2 hashes user passwords without a salt, which is vulnerable to dictionary attacks. Therefore there is a threat of security breach in the voting system. Without a salt, it is much easier for attacker...
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the...
PUBLISHED: 2021-01-21
IBM Security Identity Governance and Intelligence 5.2.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 192427.