Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in September 2009
<<   <   Page 2 / 3   >   >>
WatchGuard Extends Security With New 3G Cellular Connectivity Solution
Products and Releases  |  9/21/2009  | 
WatchGuard 3G Extend USB is designed for businesses that need high-speed WAN connectivity where hard-wired broadband is too expensive or unavailable
Digital Defense To Protect High-Tech Digital Billboards
Products and Releases  |  9/21/2009  | 
'Outdoor advertisers are extremely susceptible to possible compromise just by the nature of their business,' says Digital Defense's CEO
Trend Micro Offers Enterprise Mac Security
Products and Releases  |  9/21/2009  | 
Trend Micro Security for Mac 1.5 protects corporate users against the latest security threats targeting the Mac platform
Accuvant Announces Data Loss Prevention Services
Products and Releases  |  9/21/2009  | 
DLP services can help companies monitor improper storage or transfer of sensitive information
NATO Approves IronKey Usage
Products and Releases  |  9/21/2009  | 
IronKey S200 secure hardware encrypted USB flash drives gets NATO's OK
Gartner Says Worldwide Security Software Market On Pace To Grow 8 Percent In 2009
Products and Releases  |  9/21/2009  | 
Consumer security will remain the largest segment in the security software market
Agiliance Announces Unified Privacy Management Solution
Products and Releases  |  9/17/2009  | 
Agiliance Privacy Manager is a unified privacy management solution that helps organizations manage compliance on an integrated and singular platform
V.i. Labs Releases Piracy Report, New Piracy Intelligence Product
Products and Releases  |  9/17/2009  | 
CodeArmor Intelligence 2.0 offers enhanced reporting capabilities that capture additional evidence that ISVs can use to pursue claims against illegal use of their software products
Compliance Research Group Outlines New Security Model For Mobile Device Compliance
Products and Releases  |  9/17/2009  | 
The 'DUST Model for Managing the Risk to Enterprise Mobility' provides guidelines for complete wireless security for corporate IT and vendor community
TrustPort Unveils New Version Of Net Gateway
Products and Releases  |  9/17/2009  | 
TrustPort Net Gateway now includes more effective spam detection, support for domain signing technologies, and filtering spam in different languages
Team Cymru Renews Partnership With Microsoft For Malware Intelligence
Products and Releases  |  9/17/2009  | 
Team Cymru's malware and phishing intelligence protects Microsoft Windows Internet Explorer users
White Paper: How To Secure Privileged Identities
Products and Releases  |  9/17/2009  | 
Lieberman Software provides practical tips, including manual processes as well as automated alternatives, for securing and managing the privileged account credentials that grant access to IT resources
Comodo Offers SaaS Vulnerability Scanning For Internal Networks
Products and Releases  |  9/17/2009  | 
HackerGuardian lets PCI DSS-compliant merchants run remote scans of their internal and external networks using the same software
Gartner Outlines Four Risk Management Mistakes That Could Threaten Security Budgets
Products and Releases  |  9/17/2009  | 
Pitfalls that, if security professionals fall into, could jeopardize their spending
Chubb Offers Insurance Against Privacy Violations
Products and Releases  |  9/16/2009  | 
Integrity+ blends errors and omissions insurance (E&O) with protection for emerging technology-related injuries and privacy remediation expenses
TrustedID, Lucid Intelligence Offer U.S. Consumers Free Alerts On ID Theft
Products and Releases  |  9/16/2009  | 
Individuals can conduct a free search of compromised data information from the identity trafficking sites criminals use
WebLOQ Offers Free Double-Encrypted Email Solution
Products and Releases  |  9/16/2009  | 
LOQMail is ideal for both individuals and businesses that want to transmit personal information, sensitive data and confidential materials securely to comply with privacy regulation
Panda Security Announces Windows 7 Compatibility For All 2010 Consumer Solutions
Products and Releases  |  9/16/2009  | 
Launches beta version of its Panda 2010 security solutions to be compatible with the Windows 7 beta
Survey: Organizations Face Challenges In Readying For New Massachusetts Data Security Regulations
Products and Releases  |  9/16/2009  | 
Companies face three significant challenges - cost, time and number of vendors involved, according to survey conducted by Goodwin Procter and the International Association of Privacy Professionals
SecureWorks Streamlines PCI AOC, FFIEC Processes With Predefined Assessment Programs
Products and Releases  |  9/16/2009  | 
Programs reduce the workload of an organization because the research, documentation and analysis required to draft the appropriate questions and rate the affiliate's compliance has already been done
NCR Embeds DigitalPersona Fingerprint Sensor In New POS Workstations
Products and Releases  |  9/16/2009  | 
Fingerprint sensor, which is embedded in the top of the NCR RealPOS 70XRT touchscreen, enables POS applications to quickly identify users
netForensics Introduces New Pricing For nFX Cinxi One Offering
Products and Releases  |  9/16/2009  | 
Customers can take advantage of either perpetual licensing or flexible subscription plans
Secerno DataWall 3.3 Achieves CEF Certification From ArcSight
Products and Releases  |  9/15/2009  | 
Secerno uses an algorithmic model of security for database protection
ActivIdentity Unveils New Brand
Products and Releases  |  9/15/2009  | 
New corporate identity aimed to underscore company's ability to secure a person's identity when interacting digitally
WhiteHat Expands Website Security Management
Products and Releases  |  9/15/2009  | 
WhiteHat Security Support Plus program helps customers focus on threat prevention and remediation
Cisco Rolls Out Small Business Security Solutions
Products and Releases  |  9/15/2009  | 
In addition, Cisco announces new partner profitability programs to help its channel partners grow a profitable and sustainable small business practice
Redspin: 94% of Companies Fail Email Test
Products and Releases  |  9/15/2009  | 
Most organizations vulnerable to phishing and social engineering attacks
Sentrigo, Hitachi Data Systems Partner In DAM
Products and Releases  |  9/15/2009  | 
Integration to provide users with a single view of database security posture for breach prevention and compliance
Unisys Poll: Security Concerns Leading Cause Of Hesitancy In Adopting Cloud Computing
Products and Releases  |  9/15/2009  | 
Uncertainty over adequate security and data privacy outweighs other barriers by a wide margin
ClearPoint Announces Four Metric Applications Packages Aimed At Compliance
Products and Releases  |  9/14/2009  | 
Also integrates the ClearPoint Security Performance Manager and its compliance offering into a single solution, The ClearPoint Unified Security Performance and Compliance Manager
GlobalSign, Ubersmith Partner In SSL
Products and Releases  |  9/14/2009  | 
Partnership will enable the development of a platform fully integrated with the GlobalSign SSL Reseller Program and its Certificate deployment systems
Authentium Adds Windows 7 Support To Newest SafeCentral 2.5 Browser
Products and Releases  |  9/14/2009  | 
With this release, Authentium opens a 30-day public beta for all Windows 7 editions, as well as 64-bit XP and Vista operating systems
Jetmetric Launches Social Policy Evaluation Tool
Products and Releases  |  9/14/2009  | 
SocialPET is a new Web-based tool to enable enterprises to test how well their employees will fare when confronted with phishing and social engineering attacks
Thales Hardware Security Modules Now Available For Oracle Database 11g Release 2
Products and Releases  |  9/14/2009  | 
Thales interoperability delivers FIPS-validated key storage
PandaLabs: Non-Delivery Report Email Spam Rises 2000%
Products and Releases  |  9/14/2009  | 
In August, 20 percent of spam messages exploited this technique
Cyber-Ark Joins ArcSight EnterpriseView Partner Program
Products and Releases  |  9/11/2009  | 
Partnership integrates companies' privileged identity management, managed file transfer and SIEM tools
Panda Security Celebrates 20-Year Anniversary
Products and Releases  |  9/11/2009  | 
All of Panda Security's products are built around its Collective Intelligence cloud-based architecture
Skybox Security Enhances PCI Compliance
Products and Releases  |  9/11/2009  | 
Skybox View release 4.5 includes functionality related to authentication and user management, as well as added support for third party products
Crossbeam Publishes White Paper On Securing Virtualized Data Centers
Products and Releases  |  9/11/2009  | 
"The Emergence of Two Clouds" outlines the risks around security virtualization, particularly when it comes to the complexities that arise when trying to manage multiple trust boundaries
Great Bay Software Launches Beacon 3.1
Products and Releases  |  9/11/2009  | 
Solution features identity-based endpoint discovery, monitoring, and provisioning, while also addressing growing challenges in the security and operations of 802.1X and NAC-enabled environments
MacScan 2.7 Release Is Snow Leopard-Compatible
Products and Releases  |  9/11/2009  | 
SecureMac unveils latest version of anti-spyware privacy and security software
IBM Study: 71% of CIOs Plan Additional Investments In Risk Management, Compliance
Products and Releases  |  9/11/2009  | 
"The New Voice of the CIO" represents insights and vision of CIOs from 78 countries, 19 industries, and organizations of every size
VeriSign Rolls Out DDoS Monitoring Service
Products and Releases  |  9/11/2009  | 
Service is an extension of the VeriSign Internet Defense Network, a cloud-based DDoS mitigation service introduced earlier this year
MobiDigger Adds Safety Features For Texting
Products and Releases  |  9/10/2009  | 
Service, which allows users to mask their phone number with a chosen nickname, adds quick way for users to block a particular person from their network and to call for help
Gemalto Adds One-Time Password Device To Amazon Web Services
Products and Releases  |  9/10/2009  | 
Ezio Time Token provides AWS users with a secure way to access their accounts
SIA: Feds Should Help to Develop Electronic Security Standards
Products and Releases  |  9/10/2009  | 
Security Industry Association asks that guidance be issued to increase federal government participation in standards development activities
Extreme Networks, eTelemetry Partner To Offer NAC Alternative
Products and Releases  |  9/10/2009  | 
Extreme Networks customers now have access to asset management capabilities within eTelemetry's flagship network appliance, Locate
Trustwave Acquires Vericept
Products and Releases  |  9/10/2009  | 
Data loss prevention technology to be integrated into Trustwave's security and compliance suite
Trusted Computer Solutions Introduces Automated Lock Down Solution
Products and Releases  |  9/9/2009  | 
Security Blanket available for Red Hat Enterprise Linux 5 operating systems running on IBM System z hardware
Tufin Enhances Firewall Management Channel Program
Products and Releases  |  9/9/2009  | 
Tufin Certified Security Expert (TCSE) training and certification program is coupled with the introduction of a new two-tiered channel structure
<<   <   Page 2 / 3   >   >>


Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27099
PUBLISHED: 2021-03-05
In SPIRE before versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1, the &quot;aws_iid&quot; Node Attestor improperly normalizes the path provided through the agent ID templating feature, which may allow the issuance of an arbitrary SPIFFE ID within the same trust domain, if the attacker controls the v...
CVE-2021-28038
PUBLISHED: 2021-03-05
An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during m...
CVE-2021-28039
PUBLISHED: 2021-03-05
An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest physical addresses when a configuration has CONFI...
CVE-2021-28040
PUBLISHED: 2021-03-05
An issue was discovered in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is reached.
CVE-2020-28502
PUBLISHED: 2021-03-05
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.