Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/17/2007
11:42 AM
50%
50%

CRYPTOCard Partners With JCS & Associates

CRYPTOCard welcomes JCS & Associates to North American Partner Program

OTTAWA -- CRYPTOCard, a leading provider of two-factor authentication technology, announced that network security specialist JCS & Associates, Inc. has joined the recently launched North American Partner Program. With the shared goal of providing the highest standard of security technology and services, the partnership will allow both companies to provide positive identification solutions to such sectors as financial, healthcare, insurance and government across North America.

“We saw an opportunity for two-factor authentication in the market and did extensive research to find the right partner. Our customer base ranges from SMB’s to enterprises, and CRYPTOCard’s technology and its approach to partners was central to the needs of our customers’ security systems and policies,” said Jim Shaeffer, CEO, JCS & Associates. "The CRYPTOCard partner program provides the necessary tools, support and flexible technology our customers need for a robust security posture.”

With many SMBs and enterprises depending on value-added resellers and consultants to deliver the highest standards in their security technology and services, the CRYPTOCard Partner Program is designed to be a natural extension of partners’ offerings. The program provides proven technology, with the sales and marketing support necessary to partners to develop and strengthen their security practices.

In speaking about this new relationship Chris Dodunski, Director of North American Sales at CRYPTOCard said, “CRYPTOCard is very pleased to be collaborating with a highly established and respected partner such as JCS & Associates. They have the kind of market focus that precisely fits with our objectives for the CRYPTOCard Partner Program. We look forward to a very active and successful road ahead.”

CryptoCard Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21070
PUBLISHED: 2021-04-19
Adobe Robohelp version 2020.0.3 (and earlier) is affected by an uncontrolled search path element vulnerability that could lead to privilege escalation. An attacker with permissions to write to the file system could leverage this vulnerability to escalate privileges.
CVE-2020-7851
PUBLISHED: 2021-04-19
Innorix Web-Based File Transfer Solution versuibs prior to and including 9.2.18.385 contains a vulnerability that could allow remote files to be downloaded and executed by setting the arguments to the internal method. A remote attacker could induce a user to access a crafted web page, causing damage...
CVE-2021-29399
PUBLISHED: 2021-04-19
XMB is vulnerable to cross-site scripting (XSS) due to inadequate filtering of BBCode input. This bug affects all versions of XMB. All XMB installations must be updated to versions 1.9.12.03 or 1.9.11.16.
CVE-2021-23381
PUBLISHED: 2021-04-18
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23374
PUBLISHED: 2021-04-18
This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.