Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in August 2013
<<   <   Page 2 / 2
Webroot And Gateprotect Partner To Deliver Endpoint Protection Services
Products and Releases  |  8/13/2013  | 
Company will offer real-time endpoint protection with gateprotect's Next Generation Firewall appliances
Cyvera Raises $11M To Improve Technology To Eliminate Zero-Day Attacks
Products and Releases  |  8/13/2013  | 
Enters U.S. market and partners with McAfee
Skyhigh Networks Announces Skyhigh Secure, Advanced Data Security Solution For Information In The Cloud
Products and Releases  |  8/13/2013  | 
Skyhigh Secure’s mobile to cloud capabilities enable secure access of cloud services directly from mobile devices
Cryptzone Reveals The Extent To Which Confidential Content Is Left Unprotected In SharePoint
Products and Releases  |  8/12/2013  | 
More than half of those questioned had sent documents to someone without sufficient SharePoint permissions to access a document for themselves
Gartner: BYOD Initiatives Offer New Opportunities For Consumer Security Providers
Products and Releases  |  8/12/2013  | 
Gartner predicts that 30 percent of consumer product selection criteria will be based on requirements to secure new mobile computing platforms by 2015
Silent Circle Ends Silent Mail Service To Preempt Surveillance Threats
Products and Releases  |  8/9/2013  | 
Decision reflects commitment to users' privacy by focusing exclusively on peer-to-peer encrypted communications services ensuring total privacy and security between subscribers
IOActive Launches New Security Intelligence Service
Products and Releases  |  8/9/2013  | 
New service to consolidate experience and deliver unprecedented insight for customers
ESET Launches New Version Of ESET Mobile Security For Android
Products and Releases  |  8/9/2013  | 
All-In-One App Offers Improved Detection, Including Free and Premium Paid Features
RSA, Wombat Security Collaborate To Help Organizations Educate Users About Threats To Enterprise Security
Products and Releases  |  8/9/2013  | 
RSA to Offer Wombat's Security Training Platform to Clients as Part of Global Security Consulting Engagements
BlackBerry Awarded 'Authority To Operate' On U.S. Department Of Defense Networks
Products and Releases  |  8/8/2013  | 
DISA deploying BlackBerry Enterprise Service 10 to support BlackBerry 10 smartphones on DoD networks
Fixmo, BlackBerry Partner In Device Integrity, Tamper Detection For BlackBerry 10
Products and Releases  |  8/8/2013  | 
Fixmo and BlackBerry Collaborate to Bring Fully Integrated Solution for Government and Enterprise Customers on BlackBerry 10
WatchGuard Introduces Data Loss Prevention Solution for Unified Threat Management; One-Click Configuration Simplifies Compliance with Global Regulatory Standards
Products and Releases  |  8/8/2013  | 
Library of more than 200 predefined, multi-country rules proactively protect personal, financial and healthcare data
Norman Shark Announces Malware Analyzer G2 v4.0 and Updated Network Threat Discovery
Products and Releases  |  8/8/2013  | 
Now Featuring 32-bit and 64-bit Support for Windows 7 and 8, Leads the Automated Malware Analysis Market
Biometrics Can Revolutionize Mobile Payment Security, Says Frost & Sullivan
Products and Releases  |  8/8/2013  | 
As pure-payment protection, it offers undeniably higher levels of security and intuitive customer experience
nPulse Accelerates Security Response Times With Ability To Capture And Index 30 Million Packets Per Second
Products and Releases  |  8/8/2013  | 
Capture Probe eXtreme (CPX) Flow and Packet Capture Appliance Delivers Industry’s Fastest Packet Capture and Search Designed for Full Duplex 10Gbps Networks
WhiteHat Security Announces Support for ASP.Net Framework in Sentinel Source
Products and Releases  |  8/7/2013  | 
Expands Code Analysis Solution Designed for Development Teams Using Agile Methodologies
BeyondTrust Releases Free Tool for Auditing Google Apps
Products and Releases  |  8/7/2013  | 
PowerBroker Auditor for Google Apps automates the tracking and simplifies reporting on Google Apps audit events for IT administrators
Most Companies Remain Uninsured For Cyberattacks
Products and Releases  |  8/7/2013  | 
Experian Data Breach Resolution and Ponemon Institute study finds growing interest in cyber insurance to manage risk
Introducing Payfont, A Financial Security Startup
Products and Releases  |  8/7/2013  | 
CEO Dr. David Lanc, banking & e-commerce industry veteran, announces new patented software system to radically reduce identify theft and financial fraud
CERT Insider Threat Center Offers Free Online Event To Help Organizations Manage Insider Threats
Products and Releases  |  8/7/2013  | 
Managing the Insider Threat: What Every Organization Should Know will take place Thursday, Aug. 8, from 9 a.m. to 5 p.m. EDT.
The Open Group Releases Dependability Through Assuredness Standard
Products and Releases  |  8/6/2013  | 
Standard Outlines Criteria for Mitigating Risk Associated with Dependability of Complex Interoperable Systems and Outlines Individual Accountability
Cybersecurity Pioneer Barrett Lyon Unveils Defense.Net To Combat Newest DDoS Attacks
Products and Releases  |  8/6/2013  | 
Bessemer Venture Partners Leads $9.5 Million in Funding to Combat Increasing Scale and Sophistication of DDoS Attacks Which Are Overtaxing Traditional Solutions
Trend Micro’s Q2 Threat Roundup Reveals Android Susceptibility, Increase in Online Banking Malware
Products and Releases  |  8/6/2013  | 
Expect more Android security issues in 2013 due to increase in malware, low use of protection
Fortinet's FortiGuard Labs Reports a 30 Percent Increase in Mobile Malware in the Last Six Months; Seeing 1300 New Samples Per Day
Products and Releases  |  8/5/2013  | 
Team Reveals that Attackers are Taking Advantage of Old Vulnerabilities, Despite Being Patched, in Ruby on Rails, Java, Acrobat and Apache
California and Metro Washington D.C. – Top Destinations for Cyber Security Talent
Products and Releases  |  8/5/2013  | 
Cyber Security Professionals Looking for Employers with Code of Honor; Report Average Salaries of $116,000
Record Breaking Black Hat USA 2013 Wraps
Products and Releases  |  8/5/2013  | 
With Tremendous Momentum, Esteemed Information Security Event Details 2014 Dates, Launches Black Hat Asia, Expands Europe Show
Lancope Survey: Enterprises in Denial Regarding Network Security
Products and Releases  |  8/5/2013  | 
Nearly two-thirds of surveyed organizations not aware of any recent security incidents
FileTrek Survey Reveals That Black Hat Attendees' Opinions Split On Snowden
Products and Releases  |  8/2/2013  | 
Exactly 50% of voters believed the American who leaked details of several top-secret mass surveillance programs to the press, is a hero while 50% believed he is villain.
New SaaS Security Service Combines Vulnerability Scanning With Manual Pen Testing
Products and Releases  |  8/2/2013  | 
ImmuniWeb assessment can be used to establish whether a full in-depth penetration test or source code review is required
Average DDoS Attack Size Growing Dramatically In 2013, 2.7Gbps In June
Products and Releases  |  8/2/2013  | 
Findings from Arbor's Active Threat Level Analysis System show that DDoS continues to be a global threat
Trusted Computing Group Comments On Trusted Platform Module Security Following Black Hat Presentation
Products and Releases  |  8/1/2013  | 
TCG’s PC Client specifications have always required a secure update process for the Core Root of Trust for Measurement
Accuvant Launches New Threat Intelligence Briefing Service
Products and Releases  |  8/1/2013  | 
Service gives organizations a quarterly on-site ‘conference’ that provides information about emerging threats and trends
Application Security, Inc. Extends DbProtect Data Security Capabilities To Support Hadoop
Products and Releases  |  8/1/2013  | 
New release provides ability to evaluate and enforce Hadoop security controls in same way as traditional relational database platforms
Ponemon Institute Study: New Security Training Yields Increase In Long-Term Gain 300% Higher Than Typical Method
Products and Releases  |  8/1/2013  | 
Additionally, the research provided interesting findings specific to gender, age, employee role, industry, and more
Report Shows Strong Increase In Regional Spam And Malware Distribution
Products and Releases  |  8/1/2013  | 
Event spam transformed into real-time spam, according to Q2 Internet Threats Trend Report issued by Commtouch
<<   <   Page 2 / 2

Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-01
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by ...
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.