Products and Releases

Content posted in September 2011
Page 1 / 2   >   >>
Colt And Ciena Partner To Deliver Enterprise Managed Services
Products and Releases  |  9/30/2011  | 
New services offering features integrated data encryption solutions from Ciena
FTC Settlement Bans Alleged Spammer From Sending Unsolicited Text Messages
Products and Releases  |  9/30/2011  | 
Defendant Phil Flora cannot send unsolicited commercial text messages nor make false or misleading claims about any good or service
New Startup Social Network Promises To Be Highly Secure
Products and Releases  |  9/28/2011  | 
UmeNow.com has banned third party apps and games, ads
New Fidelis Cyber Decoders Provide Deeper Visibility Into Advanced Persistent Threats
Products and Releases  |  9/28/2011  | 
Fidelis XPS' IP Tunnel and IPsec Decoders allow better visibility into tunneled traffic
Kingston Introduces New Ultra-Secure USB Flash Drive
Products and Releases  |  9/28/2011  | 
DataTraveler 6000 meets data-at-rest regulations
InCommon And Comodo Partnership Secures Colleges And Universities
Products and Releases  |  9/28/2011  | 
Companies have issued tens of thousands of certificates
Webroot Enhances Hosted Web Filtering Services
Products and Releases  |  9/27/2011  | 
Introduce new protection against malicious sites and zero-day threats
Facebook Changes To Open Door To Interactive Scams
Products and Releases  |  9/26/2011  | 
Planned changes could flood site with Twitter-style spambots and increase targeted attacks
Cloud Security Alliance Issues First Security As A Service White Paper
Products and Releases  |  9/26/2011  | 
Defines the categories of service for cloud-based security service
Zscaler ThreatLabZ Releases Free Tool To Combat Facebook Security Issues
Products and Releases  |  9/26/2011  | 
Tools protects against against malicious threats, scams, and spam propagated on Facebook through a technique called 'Likejacking'
NETGEAR Releases VDSL UTM Firewall
Products and Releases  |  9/26/2011  | 
Integrates modular broadband and WiFi connectivity with log and quarantine capability
Seven Out Of Ten Consumers Are Scared To Shop Online According To Avira Survey
Products and Releases  |  9/23/2011  | 
During a July 2011 survey of Avira users, just 30 percent of respondents felt secure enough to be worry free as they shop online
U.S. Institutions Invest More in Anti-Money Laundering Programs As Majority See Rise In Suspicious Activity
Products and Releases  |  9/22/2011  | 
KPMG survey also found a vast majority of organizations reporting an increase in suspicious activity reports
Survey Shows Consumers Leave Businesses That Suffer Security Breach
Products and Releases  |  9/22/2011  | 
SailPoint survey finds customers are losing confidence in the organizations they once trusted
VASCO Supports Channel Partners With Free Sales Training And Certification Program
Products and Releases  |  9/22/2011  | 
Channel partners can follow the program through VASCO’s e-learning platform
Centrify Awarded Patent In Identity And Access Management
Products and Releases  |  9/22/2011  | 
Patented technology is a method and apparatus for maintaining multiple sets of identity data
NetQin Mobile Launches Security Research Center To Increase Early Detection Of Mobile Security Threats
Products and Releases  |  9/22/2011  | 
Center will focus specifically on identifying and monitoring mobile security threats that could impact consumers
New Radware Solution Fights Cyber Attacks In Real-Time
Products and Releases  |  9/21/2011  | 
AMS blocks attacks that target multiple layers of the IT infrastructure
Rapid7, Brinq Integrate Exploit Intelligence, Risk Management
Products and Releases  |  9/21/2011  | 
Technology partnership delivers integrated penetration testing and exploit data with compliance and risk management
Centrify Ships Centrify Suite 2012
Products and Releases  |  9/21/2011  | 
Solution centralizes privilege access management
Wave Announces New Technology To Combat Advanced Persistent Threats
Products and Releases  |  9/20/2011  | 
Wave Endpoint Monitor detects, mitigaties malware and other APTs in host systems
CloudPassage Halo Cloud Security Platform Now With Firewall APIs
Products and Releases  |  9/20/2011  | 
CloudPassage Halo delivers security capabilities at the server level
Kaspersky Lab Announces Kaspersky ONE
Products and Releases  |  9/20/2011  | 
'Universal Security' solution ensures protection across a wide selection of platforms and devices
McAfee Unveils New Mobile Security Strategy
Products and Releases  |  9/20/2011  | 
Three-pronged approach designed to protect mobile devices, mobile data, and mobile apps
Imation To Acquire IronKey's Security Hardware Business
Products and Releases  |  9/20/2011  | 
Imation will receive an exclusive license from IronKey for its secure storage management software and service
Rapid7 Releases Nexpose 5.0
Products and Releases  |  9/19/2011  | 
Nexpose 5.0 addresses security challenges presented by virtualization technologies and increase of malware
Richard Clarke Joins Board Of Bit9
Products and Releases  |  9/19/2011  | 
Clarke is former Cybersecurity Czar for President George W. Bush and a noted expert on cyberwar and counter-terrorism
Trend Micro Announces Next-Generation Mobile Security Solution For The Android Platform
Products and Releases  |  9/16/2011  | 
Trend Micro Mobile Security Personal Edition blocks infected apps from installing and stealing personal information
Security Professionals’ Salaries Up 3 Percent In 2011, According To ASIS 2011 Salary Survey
Products and Releases  |  9/16/2011  | 
Average compensation was $97,000
Tripwire Enterprise 8.1 Brings Security Configuration Management To Boardroom
Products and Releases  |  9/15/2011  | 
Latest release is powered by Tripwires new VIA Platform
Trend Micro Extends Innovative Threat Intelligence To HP ArcSight
Products and Releases  |  9/15/2011  | 
Customers gain increased visibility and security for threats targeted at virtualized datacenters and cloud computing deployments
Kensington Delivers Next Level Of Mobile Security For iPad And iPhone
Products and Releases  |  9/15/2011  | 
Unveils BungeeAir, SecureBack cases
Evolving Cyber Threats Continue To Drive Security Strategy And Investing Worldwide
Products and Releases  |  9/15/2011  | 
Asia leads commitment to bolster information security
IronKey Introduces Integrated, Multilayer Online Banking Security Platform
Products and Releases  |  9/15/2011  | 
Trusted Access helps to avert criminal attacks on bank customers that use malicious software
FireHost Secures $10 Million In Series B Funding
Products and Releases  |  9/15/2011  | 
Company specializes in protecting websites and applications with compliance and high-traffic needs
Cyber-Ark Launches Secure File Transfer In The Cloud Service
Products and Releases  |  9/14/2011  | 
Inter-Business Vault as a Service enables secure exchange of sensitive files with external third parties
Rust Consulting And Identity Theft 911 Partner To Offer Data Breach Services
Products and Releases  |  9/14/2011  | 
Partnership includes breach avoidance and risk mitigation through response and resolution
NETGEAR Rolls Out Wireless-N 8-port Gigabit VPN Firewall For Under $180
Products and Releases  |  9/14/2011  | 
ProSafe is an all-in-one router, wireless-N access point, gigabit switch and SSL VPN firewall
Tufin Launches Tufin Security Suite 6.0
Products and Releases  |  9/14/2011  | 
TSS 6.0 provides deeper directory services integration of user and application intelligence
Imprivata To Resell Phone-Based Authentication Solution For Mobile Physicians And Nurses
Products and Releases  |  9/14/2011  | 
Imprivata OneSign and OneSign Anywhere provide care providers with secure access to electronic medical records
McAfee And Intel Unveil New Security Technology
Products and Releases  |  9/13/2011  | 
DeepSAFE provides a trusted view of system events below the operating system
Goode Intelligence: Big Growth Set For Mobile Biometric Security Market
Products and Releases  |  9/13/2011  | 
Significant growth expected from mobile biometric security market
Arbor Networks Partners With Tech Data To Resell Its DDoS Protection Devices
Products and Releases  |  9/13/2011  | 
Pravail APS protects the Internet data center edge against threats to availability
ForeScout Teams With HP ArcSight To Deliver Real-Time Visibility And Remediation
Products and Releases  |  9/12/2011  | 
Teaming connects ForeScout NAC platform to HP ArcSight ESM product
Symantec Announces CA Manager
Products and Releases  |  9/12/2011  | 
Symantec Certificate Intelligence Center automatically evaluates certificates nearing expiration and triggers alerts
Perimeter E-Security Unveils Compliance And Continuity Suite For Microsoft Office 365
Products and Releases  |  9/12/2011  | 
Solution includes enhanced continuity and e-discovery capabilities
Global Smartphone Security Market To Be Worth $2964.89 Million In 2016
Products and Releases  |  9/8/2011  | 
Growth is particularly higher in geographies such as Europe and APJ
Xceedium Acquires Cloakware Password Authority Business From Irdeto
Products and Releases  |  9/8/2011  | 
Xceedium also announces availability of Xceedium Xsuite
MobilEncrypt ENDPOINT Delivers On-The-Device Email Encryption For The iPhone And iPad
Products and Releases  |  9/8/2011  | 
Solution enables IT managers to centrally manage company employees and assign user credentials
Certes Networks Announces Network Encryption Starter Kit
Products and Releases  |  9/7/2011  | 
Encryption Starter Kit includes TrustNet Manager software and two 3-Mbps multilayer encryption appliances
Page 1 / 2   >   >>


Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
SEC: Companies Must Disclose More Info on Cybersecurity Attacks & Risks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/22/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.