Quantcast

Latest Vulnerability Stories

2014-04-02 08:21:18

Platform convergence intensifies competition, while driving technology innovation MOUNTAIN VIEW, Calif., April 2, 2014 /PRNewswire/ -- Vulnerability management remains an essential security technology for companies to harden the security posture of their network. The global vulnerability management market will witness steady expansion as companies look to handle the evolving threat landscape through early detection of network and application vulnerabilities followed by prioritized, targeted...

2014-03-27 23:23:08

This year’s best DIY security systems are now available for consumers to review at SecuritySystemReviews.com. A site designed to help consumers conduct research before buying a security system, while offering advice to save time and money. Fresno, Ca (PRWEB) March 27, 2014 Where time and money are scarce in this fast-paced world, information is a hot commodity and a powerful weapon to wield when shopping for the best do it yourself security system. Whether the client is a private...

2014-03-26 23:30:43

All entities, including merchants, service providers and financial institutions, must comply with PCI DSS Requirement 6 – “Develop and Maintain Secure Systems and Applications.” Reston, VA (PRWEB) March 26, 2014 ControlCase, a leading global provider of Compliance as a Service (CaaS), Certifications, and IT Governance, Risk and Compliance (GRC) software announced the release of their On-Demand Online Web Application Security Project (OWASP) Training, developed to cater to...

2014-03-26 16:28:07

LONDON, March 26, 2014 /PRNewswire/ -- Reportbuyer.com just published a new market research report: Driving to Root Cause Vulnerability Remediation IntroductionExecutives in charge of their organization's data and infrastructure security have concerns. Top of the list is application vulnerabilities; that is, the looseness in application software code and logic that provide attackers the means and opportunity to pursue their nefarious activities (e.g., exfiltrate valuable data, steal...

2014-03-24 23:04:42

Network Situational Awareness Provides Foundation for a Unified Security Risk Profile Somerset, NJ and Livermore, CA (PRWEB) March 24, 2014 Lumeta Corporation, the leader in network situational awareness, announced today that its IPsonar and ESI solutions are now seamlessly integrated with the Allgress Insight Risk Management Suite. Lumeta provides comprehensive visibility into all pathways and connected devices on a network, including leaks and vulnerabilities – information that the...

2014-03-17 23:22:46

Industry Leader Honored With Seven Awards at 10th Annual Awards Dinner Portland, Oregon (PRWEB) March 17, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that Info Security Products Guide, the industry's leading information research and advisory guide, honored the company with a 2014 Grand Trophy and six additional awards. Winners were announced during an awards dinner and presentation on February 24, 2014, at...

Pwn2Own competition results
2014-03-15 06:19:02

redOrbit Staff & Wire Reports - Your Universe Online All four of the major Internet browsers were among the programs that fell victim to zero-day exploits during the HP-sponsored Pwn2Own hacking competition, various media outlets reported earlier this week. According to CNET’s Seth Rosenblatt, Apple Safari, Google Chrome, Microsoft Internet Explorer, Mozilla Firefox and Adobe’s Flash and Reader browser plug-ins were programs cracked by eight research teams participating in the...

2014-03-13 23:22:49

Tripwire IP360 Now Integrated Into North American Electric Reliability Corporation (NERC) Solution Suite Portland, Oregon (PRWEB) March 13, 2014 Tripwire, Inc., a global provider of risk-based security and compliance management solutions, today announced the integration of Tripwire® IP360 TM into their NERC Solution Suite version 2.0, a powerful combination of customized tools and services designed to help utilities automate, achieve and maintain compliance with all approved versions...

2014-03-06 23:01:35

Tripwire Survey Examines Views of Over 150 Information Security Professionals at Annual Information Security Conference Portland, OR (PRWEB) March 06, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the results of a survey of over 150 attendees at the RSA Conference USA 2014 in San Francisco, California. Survey respondents were asked which security event, the Target data breach or Snowden leaks, had a greater...

2014-03-05 12:31:29

Perimeter defenses are not enough; organizations need to examine their endpoints better for signs of compromise BETHESDA, Md., March 5, 2014 /PRNewswire-USNewswire/ -- Automation and process to monitor endpoints for threats are lacking in organizations, according to a survey completed by 948 IT professionals conducted by the SANS Institute. Full results of the survey, sponsored by Guidance Software, will be discussed during a March 13 Webcast at 1 PM EDT. More than 47% of 948...


Word of the Day
caparison
  • A cloth or covering, more or less ornamented, laid over the saddle or furniture of a horse, especially of a sumpter-horse or horse of state.
  • Clothing, especially sumptuous clothing; equipment; outfit.
  • To cover with a caparison, as a horse.
  • To dress sumptuously; adorn with rich dress.
This word ultimately comes from the Medieval Latin 'cappa,' cloak.
Related