Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/28/2006
11:40 AM
50%
50%

Cartus Earns Cybertrust Certification

Cartus has obtained Cybertrust Security Management Program (SMP) Enterprise Certification for the fourth year in a row

HERNDON, Va. -- Cybertrust®, the global information security specialist, today announced that Cartus has obtained Cybertrust Security Management Program (SMP) Enterprise Certification for the fourth year in a row. Cartus, the premier provider of global mobility management and workforce development solutions serving the corporate, government and affinity markets, is one of a select group of companies in the world to achieve the industry’s most mature information security certification. The SMP approach allows Cartus to more effectively gain visibility into and control over its security infrastructure. Additionally, this certification assures customers and partners that Cartus is reducing risk and enhancing overall security in a consistent, programmatic fashion.

The SMP Enterprise Certification arms Cartus with a certification and risk reduction program that addresses the company’s entire information security program, including network and system analysis, as well as physical and policy inspection. Specifically, the certification shows that Cartus has documented and implemented information security policies and standards; put into practice effective security controls; mitigated high-severity vulnerabilities; implemented email filtering; and updated anti-virus programs.

“The biggest driver for the Cybertrust SMP enterprise certification is knowing that we have independent third-party attestation from industry experts who vigilantly examine and certify that our processes, policies, procedures and technologies accurately reflect our Security Promise,” said Jack Doyle, senior vice president, information technology, Cartus. “Our Security Promise is our utmost commitment to information security and maintaining confidentiality of our clients’ data."

“Displaying the SMP enterprise seal demonstrates that Cartus has earned the most mature and respected security certification in the industry,” said Malcolm Palmer, director, product management, Cybertrust. “Cartus serves as an excellent example for other companies that are looking to take a proactive, systematic approach to measuring and validating their security program. By acting as an independent, third-party expert for customers like Cartus, Cybertrust helps businesses take control and drive added value from their security programs.”

Doyle added, “As a global company, ensuring that we are proactively managing information security across our global locations is paramount. Leveraging our SMP certification allows us to quickly take the pulse of sites around the world. In addition to helping Cartus manage its information security program, the SMP certification also serves as a watermark of acceptance among our clients and partners that we are highly committed to information security and have completed our due diligence.”

SMP is a robust, detailed and programmatic security and risk reduction program. The program helps organizations improve their overall security posture through the identification of critical assets; assessment and prioritization of threats; and mitigation of risks. The ongoing, systematic approach allows business to more easily facilitate regulatory compliance. Additionally, SMP helps to protect critical business systems from malicious attacks and other threats.

Cybertrust

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8818
PUBLISHED: 2020-02-25
An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore...
CVE-2020-8819
PUBLISHED: 2020-02-25
An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass ...
CVE-2020-9385
PUBLISHED: 2020-02-25
A NULL Pointer Dereference exists in libzint in Zint 2.7.1 because multiple + characters are mishandled in add_on in upcean.c, when called from eanx in upcean.c during EAN barcode generation.
CVE-2020-9382
PUBLISHED: 2020-02-24
An issue was discovered in the Widgets extension through 1.4.0 for MediaWiki. Improper title sanitization allowed for the execution of any wiki page as a widget (as defined by this extension) via MediaWiki's } parser function.
CVE-2020-1938
PUBLISHED: 2020-02-24
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that ...