Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in September 2014
<<   <   Page 2 / 2
Porticor And Nscaled Partner To Deliver Secure And Compliant Business Continuity And Disaster Recovery For Cloud Data
Products and Releases  |  9/4/2014  | 
Porticor Adds Software-Defined Encryption Key Management to nScaleds IT BCDR Platform for Protection of Replicated Data in the Cloud
Kofax Acquires Softpro GmbH
Products and Releases  |  9/4/2014  | 
Transaction Adds Signature Verification, Fraud Detection and Electronic Signature Capabilities to Kofaxs Smart Process Applications
Entrust, an SSL Digital Certificate and Services Leader, to Re-Join CA/Browser Forum
Products and Releases  |  9/3/2014  | 
Entrust formerly chaired the group for nearly seven years.
Easy Solutions Announces Support For DMARC, To Improve Global Email Health
Products and Releases  |  9/3/2014  | 
Clients Gain Significant Uplift in Attack Visibility, Improve Takedown Times Leveraging DMARC
MACH37 Launches the Fall 2014 Class of Cybersecurity Startups
Products and Releases  |  9/2/2014  | 
Six companies selected.
PandaLabs Q2 2014 Report: PUPs on the rise
Products and Releases  |  9/2/2014  | 
Malware still generated at a rate of 160,000 new samples a day in Q2 2014, reports PandaLabs.
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-06-27
When performing the initialization operation of the Split operator, if a dimension in the input shape is 0, it will cause a division by 0 exception.
PUBLISHED: 2022-06-27
An authenticated user with admin privileges may be able to terminate any process on the system running Elcomplus SmartICS v2.3.4.0.
PUBLISHED: 2022-06-27
Elcomplus SmartICS v2.3.4.0 does not validate the filenames sufficiently, which enables authenticated administrator-level users to perform path traversal attacks and specify arbitrary files.
PUBLISHED: 2022-06-27
Elcomplus SmartICS v2.3.4.0 does not neutralize user-controllable input, which allows an authenticated user to inject arbitrary code into specific parameters.
PUBLISHED: 2022-06-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.