Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in September 2010
<<   <   Page 2 / 2
IBM To Buy OpenPages
Products and Releases  |  9/15/2010  | 
Acquisition expands IBM's business analytics capabilities to support compliance and risk management processes
(ISC)2 Opens Security Professional Networking Site To Industry
Products and Releases  |  9/15/2010  | 
InterSeC membership is free
Mu Dynamics Teams With USGv6 Lab To Offer Easy Transition To IPv6
Products and Releases  |  9/15/2010  | 
New test content contains ten of thousands of automated test cases
Blue Coat Expands Malware Defenses In WebPulse Service
Products and Releases  |  9/15/2010  | 
Blue Coat has added to the service a mal-PDF scanner and mal-script detector
CipherOptics Announces Variable Speed Encryption Appliances
Products and Releases  |  9/15/2010  | 
Variable Speed Encryption platform allows customers to customize encryption throughput to match bandwidth link speeds from 3Mbps to 1Gbps
Core Security Ships Core Insight Enterprise Beta
Products and Releases  |  9/15/2010  | 
Automated testing and measurement solution is available to its beta customers
Panda Security Publishes Findings From First Annual Social Media Risk Index For SMBs
Products and Releases  |  9/15/2010  | 
Thirty-three percent of SMBs have been infected by malware propagated via social networks
Protegrity Sues SafeNet, nuBridges, Voltage Security For Infringement Of Data Encryption Patents
Products and Releases  |  9/15/2010  | 
The suits, which seek to protect Protegrity's intellectual property, were all filed in the Federal Court in Hartford, Conn.
Integrity Global Security Unveils First EAL 7 CertifiableType-1 Hypervisor
Products and Releases  |  9/14/2010  | 
INTEGRITY Secure Type-1 Hypervisor provides centralized, remote provisioning, in both thin-and thick-client form factors
TCG Extends Trust-Based Security To The Cloud
Products and Releases  |  9/13/2010  | 
Effort will be led by the organization's new Trusted Multi-Tenant Infrastructure work group
Sentrigo Launches Vulnerability Assessment Solution For Databases
Products and Releases  |  9/13/2010  | 
Hedgehog Enterprise v4.0 combines features of Sentrigo DBscanner and integration with McAfee ePO
Check Point Awarded International Common Criteria EAL4 CertificatiofFn or Media Encryption
Products and Releases  |  9/13/2010  | 
Check Point Media Encryption enables businesses to secure sensitive corporate data and block incoming malwar
Deadline To Enroll In Nation's Largest High School Cyber Defense Competition Quickly Approaches
Products and Releases  |  9/13/2010  | 
CyberPatriot III is open until October 8
Blocking Anonymous Proxies Still A Headache For IT Managers, Pose Big Security Risk
Products and Releases  |  9/13/2010  | 
Bloxx announces results of its third independent Anonymous Proxy Survey
SpectorSoft Launches eBlaster Mobile Remote Monitoring Software For BlackBerry Devices
Products and Releases  |  9/13/2010  | 
Software records all of a user's call logs, mobile email, and text activity
IBM Launches New Data Security Software
Products and Releases  |  9/13/2010  | 
Software automatically monitors application and database usage across the enterprise
DNSSEC Enabled For .INFO
Products and Releases  |  9/10/2010  | 
Afilias enables DNSSEC for the .INFO top-level domain
Lookout Mobile Security Announces 2 Million Registered Users
Products and Releases  |  9/10/2010  | 
Lookout Mobile Security is available for Android, BlackBerry and Windows Mobile smartphones
SIA Releases Privacy Framework For Security Technology
Products and Releases  |  9/10/2010  | 
Framework identifies 12 guidelines to be followed in the deployment of electronic physical security solutions
Commtouch Completes Acquisition Of Authentium's Antivirus Division
Products and Releases  |  9/10/2010  | 
Command Antivirus product includes technology to protect against viruses, spyware, Trojans, and other threats
CyberArk Unveils Threat Analytics for Malicious Privileged Behavior
Products and Releases  |  9/10/2010  | 
Targeted Data Analytics Provides Faster Time to Attack Detection over Big Data Approach.
Cybercriminals Creating Nearly 60,000 Fake Websites to Trick And Infect Users Each Week, Reports PandaLabs
Products and Releases  |  9/9/2010  | 
Three-month investigation shows eBay and Western Union together account for nearly half of all malicious sites exploiting brands
Anti-Malvertising Task Force Launched
Products and Releases  |  9/9/2010  | 
Online Trust Alliance rRequests comment on new guidelines and best practices
GlobalSign Promotion Enables Individual Developers To Secure Code And Applications
Products and Releases  |  9/9/2010  | 
Code Signing Digital Certificates enable developers not associated with an incorporated organization to protect brand identity
Norton: Cybercrime Strikes More Than Two-Thirds Of Internet Users
Products and Releases  |  9/8/2010  | 
The Norton Cybercrime Report: The Human Impact shines a light on the personal toll cybercrime takes
Truedomain Teams With Goodmail To Stop Phishing
Products and Releases  |  9/8/2010  | 
Solution ensures delivery of legitimate email, prevents brands from being used as bait in phishing attacks
ManageEngine Launches New Software For Managed Service Providers
Products and Releases  |  9/8/2010  | 
ManageEngine MSP Center Lite offers remote network and systems management
Tips For Safer Social Networking From ICSA Labs
Products and Releases  |  9/8/2010  | 
How consumers can enjoy social networking while protecting themselves from security threats
Arxan Technologies Announces EnsureIT For Android -- Security For Android Applications
Products and Releases  |  9/8/2010  | 
Product secures applications for Android-based mobile devices
Neustar Announces .BIZ Domain Name Security Enhancements
Products and Releases  |  9/8/2010  | 
Deploys both DNS security extensions (DNSSEC) and the Registry Lock service
Trend Micro Launches Titanium With 'Free Security Makeovers'
Products and Releases  |  9/8/2010  | 
Consumers have a chance to win one of three new premium Dell PC systems
Trend Micro Launches Titanium 2011 With Cloud-Client Technologies To Protect Against Cyber Crime
Products and Releases  |  9/8/2010  | 
Titanium 2011 combines cloud-based Web, email, and file reputation services with Trend Micro's Smart Scanning technology
Free Cloud Antivirus Security Startup Immunet Reaches 500,000 Members
Products and Releases  |  9/7/2010  | 
Immunet Protect Free 2.0 is available as a free download
Trustwave Launches New 360 Application Security Program
Products and Releases  |  9/7/2010  | 
Program to be unveiled at AppSec USA 2010
Cigital Names Peter Esparrago As President
Products and Releases  |  9/7/2010  | 
Esparrago is a global technology executive with more than 25 years of experience in a wide variety of industries
Prime Factors Rolls Out PCI Encryption Software
Products and Releases  |  9/7/2010  | 
EncryptRIGHT comes bundled with management, secure audit logs, and predefined PCI reporting capabilities
NetQin Mobile Manager V3.0 Debut To Keep User In Control Of Android Devices
Products and Releases  |  9/7/2010  | 
Application designed to keep users in control of their mobile phones
Heartland Payment Systems Selects ArcSight and Vigilant For Threat And Risk Management Capabilities
Products and Releases  |  9/7/2010  | 
Vigilant will manage the ArcSight solution at Heartland
Sourcefire Integrates IPS With Qualys Vulnerability Management
Products and Releases  |  9/7/2010  | 
Qualys Connector leverages Sourcefire Defense Center to correlate threats detected by Sourcefire IPS
Qualys Releases QualysGuard PCI 5.0 with New Dashboard and Interactive Workflows
Products and Releases  |  9/3/2010  | 
New Release Raises the Bar in Terms of Ease of Use and Automation of PCI Compliance Tasks
nCircle Releases Updated PCI Scan Service
Products and Releases  |  9/3/2010  | 
Enhanced features enable customers and ASVs to comply with PCI DSS requirements
F5 Rolls Out VMware View 4.5
Products and Releases  |  9/3/2010  | 
F5's Application Ready Solution for VMware View 4.5 optimizes user experience with secure access, single sign-on, high performance, and scalability
Cloud Security Alliance's User Certification Now Available
Products and Releases  |  9/3/2010  | 
Certificate of Cloud Security Knowledge (CCSK) Aimed at Promoting Secure Cloud Computing for All
Check Point Simplifies Public and Private Cloud Security
Products and Releases  |  9/2/2010  | 
New Security Gateway Virtual Edition brings plug-and-play security to the cloud with Check Point software blades
Centrify Automates Cloud Security for Enterprise Private and Public Clouds
Products and Releases  |  9/2/2010  | 
Centrify Suite delivers 'enterprise-out' centralized cloud server control using Microsoft Active Directory
Onapsis Unveils Security Assessment Tool For SAP
Products and Releases  |  9/2/2010  | 
Onapsis releases X1, the first solution for Vulnerability Management, Penetration Testing and Compliance for SAP platforms
Trend Micro InterScan Messaging Security Virtual Appliance VMware Ready for Mail Security
Products and Releases  |  9/1/2010  | 
InterScan Messaging Security Virtual Appliance v8 (IMSVA) achieves new VMware Ready(TM) status for email security virtual appliances
Centrify Enables Enterprise-Out Security for Applications Hosted in VMware vCloud Director Environments
Products and Releases  |  9/1/2010  | 
Dynamically discovers and secures vApps and centralizes management through Microsoft Active Directory
TriGeo Unveils SIM Version 5.1
Products and Releases  |  9/1/2010  | 
New Release Combines Real-Time Event Analysis with Visual Search Technology and Delivers New Insight and Control to Midmarket Organizations Drowning in Log Data
<<   <   Page 2 / 2

Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-01
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by ...
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.