Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

04:16 AM

Newcastle Uses Sealed

SealedMedia announced that Newcastle Building Society has chosen its software to protect the organisation's digitised intellectual capital

LOS GATOS, Calif. -- SealedMedia Inc., the leading provider of cross-platform enterprise digital rights management (E-DRM) solutions, today announced that Newcastle Building Society has chosen its software to protect the organisation’s digitised intellectual capital. By using SealedMedia Enterprise, Newcastle shares information securely with solicitors, valuers, estate agents and other third parties.

Newcastle Building Society is one of the United Kingdom’s leading building societies, with assets in excess of £3.8 billion. Headquartered in Newcastle, England, the company maintains a network of 33 branches throughout the U.K. and in Gibraltar, to meet the complex and changing financial needs of its customer base. SealedMedia E-DRM software provides a secure platform for sharing and accessing information across Newcastle’s network.

“U.K. companies must properly safeguard customer and partner data in order to comply with regulatory mandates whilst providing peace of mind to customers,” said Pat Watson, Information Security manager for Newcastle Building Society. “SealedMedia is one of the key solutions we have implemented to deliver that peace of mind.”

“Newcastle is the latest in a growing list of international customers that now understand the value of E-DRM,” said Nigel Hopkinson, VP Sales, SealedMedia. “Regardless of a company’s vertical market or geographic location, chances are they need an E-DRM solution to ensure compliance with today’s regulatory mandates.”


Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-21
An issue was discovered in Contactmanager 13.x before, 14.x before, and 15.x before for FreePBX In the Contactmanager class (html\admin\modules\contactmanager\Contactmanager.class.php), an unsanitized group variable coming from the URL is reflected in HTML on...
PUBLISHED: 2019-10-21
Trend Micro Anti-Threat Toolkit (ATTK) versions and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed.
PUBLISHED: 2019-10-21
app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any comma...
PUBLISHED: 2019-10-21
resources/cmd.php in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute any commands on the host as www-data.
PUBLISHED: 2019-10-21
On the RICOH MP 501 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn and KeyDisplay parameter to /web/entry/en/address/adrsSetUserWizard.cgi.