Quantcast

Latest Vulnerability Stories

2014-03-26 23:30:43

All entities, including merchants, service providers and financial institutions, must comply with PCI DSS Requirement 6 – “Develop and Maintain Secure Systems and Applications.” Reston, VA (PRWEB) March 26, 2014 ControlCase, a leading global provider of Compliance as a Service (CaaS), Certifications, and IT Governance, Risk and Compliance (GRC) software announced the release of their On-Demand Online Web Application Security Project (OWASP) Training, developed to cater to...

2014-03-26 16:28:07

LONDON, March 26, 2014 /PRNewswire/ -- Reportbuyer.com just published a new market research report: Driving to Root Cause Vulnerability Remediation IntroductionExecutives in charge of their organization's data and infrastructure security have concerns. Top of the list is application vulnerabilities; that is, the looseness in application software code and logic that provide attackers the means and opportunity to pursue their nefarious activities (e.g., exfiltrate valuable data, steal...

2014-03-24 23:04:42

Network Situational Awareness Provides Foundation for a Unified Security Risk Profile Somerset, NJ and Livermore, CA (PRWEB) March 24, 2014 Lumeta Corporation, the leader in network situational awareness, announced today that its IPsonar and ESI solutions are now seamlessly integrated with the Allgress Insight Risk Management Suite. Lumeta provides comprehensive visibility into all pathways and connected devices on a network, including leaks and vulnerabilities – information that the...

2014-03-17 23:22:46

Industry Leader Honored With Seven Awards at 10th Annual Awards Dinner Portland, Oregon (PRWEB) March 17, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that Info Security Products Guide, the industry's leading information research and advisory guide, honored the company with a 2014 Grand Trophy and six additional awards. Winners were announced during an awards dinner and presentation on February 24, 2014, at...

Pwn2Own competition results
2014-03-15 06:19:02

redOrbit Staff & Wire Reports - Your Universe Online All four of the major Internet browsers were among the programs that fell victim to zero-day exploits during the HP-sponsored Pwn2Own hacking competition, various media outlets reported earlier this week. According to CNET’s Seth Rosenblatt, Apple Safari, Google Chrome, Microsoft Internet Explorer, Mozilla Firefox and Adobe’s Flash and Reader browser plug-ins were programs cracked by eight research teams participating in the...

2014-03-13 23:22:49

Tripwire IP360 Now Integrated Into North American Electric Reliability Corporation (NERC) Solution Suite Portland, Oregon (PRWEB) March 13, 2014 Tripwire, Inc., a global provider of risk-based security and compliance management solutions, today announced the integration of Tripwire® IP360 TM into their NERC Solution Suite version 2.0, a powerful combination of customized tools and services designed to help utilities automate, achieve and maintain compliance with all approved versions...

2014-03-06 23:01:35

Tripwire Survey Examines Views of Over 150 Information Security Professionals at Annual Information Security Conference Portland, OR (PRWEB) March 06, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the results of a survey of over 150 attendees at the RSA Conference USA 2014 in San Francisco, California. Survey respondents were asked which security event, the Target data breach or Snowden leaks, had a greater...

2014-03-05 12:31:29

Perimeter defenses are not enough; organizations need to examine their endpoints better for signs of compromise BETHESDA, Md., March 5, 2014 /PRNewswire-USNewswire/ -- Automation and process to monitor endpoints for threats are lacking in organizations, according to a survey completed by 948 IT professionals conducted by the SANS Institute. Full results of the survey, sponsored by Guidance Software, will be discussed during a March 13 Webcast at 1 PM EDT. More than 47% of 948...

2014-02-28 23:26:29

Coverage Updates Include Tivoli Products and Expanded IBM DB2 San Francisco, CA (PRWEB) February 28, 2014 Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced that key products now discover more than 90,000 conditions, including vulnerabilities, configurations and operating systems, and more than 14,000 applications. Tripwire solutions ensure that assets on customer networks are accurately and comprehensively profiled,...

2014-02-27 08:32:06

VIENNA, February 27, 2014 /PRNewswire/ -- "SAS for Windows" is part of a software for statistical analysis, data-mining and business intelligence. The software was shipped by the manufacturer SAS Institute Inc. containing a critical vulnerability [1]. The vulnerabilities were discovered in a routine security crash test by experts of the SEC Consult Vulnerability Lab ( http://www.sec-consult.com). The vulnerability enables state-sponsored or criminal hackers to create a...


Word of the Day
Cthulhu
  • A gigantic fictional humanoid alien god being described with a head resembling an octopus and dragon wings and claws, around whom an insane cult developed.
  • Pertaining to the mythos of Cthulhu and additional otherworldly beings created by H. P. Lovecraft or inspired by his writings and imitators.
This word was invented in 1926 by H.P. Lovecraft for his short story, 'The Call of Cthulhu.' 'Cthulhu' may be based on the word 'chthonic,' which in Greek mythology refers to the underworld.
Related