Millie
your market intelligence analyst
Search Results
Edit Save
2,692 results
Global Security 10/22/2019 12:10
Pulse Secure announced that it has introduced new Secure Access management and threat mitigation capabilities within its Zero Trust Network Access platform. Pulse Secure's Zero Trust Network Access platform allows organizations to centrally manage policy and automate secure access to applications, data and services that are delivered on-premise or in private and public cloud environments. Pulse Secure has enhanced its VDI integration with RDS (Remote Desktop Services) Broker to simplify (...). -
Global Security 10/22/2019 11:38
Kaspersky has launched a new solution designed to help organisations and property owners defend themselves from unauthorised trespassing by civilian drones. Through a combination of several sensors – including a new approach to drone detection founded by the company using laser scanning – and machine learning technologies, Kaspersky Antidrone can automatically spot, identify and prohibit unmanned aircraft from entering restricted areas. This is all done without damaging the devices. To help (...). -
Global Security 10/22/2019 11:21
Ping Identity released results from its 2019 Consumer Survey: Trust and Accountability in the Era of Breaches and Data Misuse. The results expose how today's environment—ripe with data misuse and large-scale security breaches—is impacting consumer behavior and relationships with service providers around the world. Data security is a legitimate worry for today's consumers around the world. Approximately one half (49%) of respondents report that they are more concerned about protecting their (...). -
Global Security 10/22/2019 09:31
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: FortiGate, FortiGate Virtual Appliance, FortiOS. Severity: 2/4. Consequences: client access/rights. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 22/08/2019. DESCRIPTION OF THE VULNERABILITY An attacker can trigger a Cross Site Scripting via SSL VPN Portal of FortiOS, in order to run JavaScript code in the (...). -
Global Security 10/22/2019 05:12
National Cybersecurity Awareness Month (NCSAM) is observed every October to raise cybersecurity awareness and provide resources to help individuals and enterprises be safer and more secure online. This year, ExtraHop® is joining NCSAM organisers and security professionals around the world in offering tips and strategies for enterprise organisations to improve their security posture across hybrid and cloud workloads. Below are the company's top five tips for building smarter enterprise (...). -
Global Security 10/22/2019 04:53
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Debian, Linux, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu. Severity: 2/4. Consequences: administrator access/rights, denial of service on server, denial of service on service. Provenance: user shell. Confidence: confirmed by the editor (5/5). Creation date: 22/08/2019. DESCRIPTION OF THE VULNERABILITY An attacker can force (...). -
Global Security 10/22/2019 04:52
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can trigger a Cross Site Scripting of Cisco Unified Contact Center Express, in order to run JavaScript code in the context of the web site. Impacted products: Cisco Unified CCX. Severity: 2/4. Consequences: client access/rights. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 22/08/2019. DESCRIPTION OF THE (...). -
Global Security 10/22/2019 04:51
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can trigger a Cross Site Request Forgery of Cisco IOS XE NGWC, in order to force the victim to perform operations. Impacted products: Cisco Catalyst, IOS XE Cisco. Severity: 2/4. Consequences: user access/rights. Provenance: internet client. Confidence: confirmed by the editor (5/5). Creation date: 22/08/2019. DESCRIPTION OF THE VULNERABILITY (...). -
Global Security 10/22/2019 04:44
Secure I.T. Environments Ltd has announced the handover its latest data centre project to Thurrock County Council. The new 234m2 data centre, will provide a new energy and space efficient home for an IT infrastructure serving 170,000 residents across over 160km2. The data centre was required as the operational location and IT systems had reached end of life. This led to a critical timeline to ensure handover for the new facility was achieved on time and within budget. The project was split (...). -
Global Security 10/22/2019 04:14
Sophos announced availability of Sophos Cloud Optix on Amazon Web Services (AWS) Marketplace. As a new agentless software-as-a-service (SaaS) offering, Cloud Optix automatically discovers cloud assets, detects cloud security vulnerabilities and misconfigurations, and provides threat response for AWS customers. More than 200,000 active AWS Marketplace customers can now access and set up Cloud Optix on a per-host, per-hour basis for flexible scaling, with no minimum term contract. (...). -
Global Security 10/21/2019 10:14
Minkels, a brand of Legrand, unveiled its new cabinet platform solution for data centers. The new platform, named Nexpand, has been designed and built from the ground up based around four values: Smart, Solid, Secure and Sustainable. With the feature-rich Nexpand platform customers can rely on a scalable and future-proof platform meeting increased data center technology demands as a result of the exponential rise in Digitalization, Internet of Things (IoT), 5G, Edge and Artificial (...). -
Global Security 10/21/2019 09:08
Driving licenses, transport cards, employee access control, health services… governments and associated bodies across the world are faced with a number of ID solutions to be developed, managed and delivered. And in an increasing effort to streamline, centralize and formalize more services and operations, demand for new and advanced solutions has never been higher. But for the agencies responsible, it's a brave new world. Faced with numerous strategic and technical considerations, finding the (...). -
Global Security 10/21/2019 05:28
Not everything is always going well on the Internet. Spam, phishing, man-in-the-middle attacks, spoofing, the list of bad guys on the net and their sophisticated methods is long. And in almost all cases, it is a medium that we all use on a daily basis, e-mail. For understandable reasons, cybercriminals do not use their own identity as a sender. Instead, they like to use reputable companies and brands, often banks, payment services, online shops or delivery companies. In principle, any brand (...). -
Global Security 10/21/2019 04:38
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: AIX, IBM i, RHEL, SUSE Linux Enterprise Desktop, SLES. Severity: 2/4. Consequences: data reading, denial of service on service, denial of service on client. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 19/08/2019. DESCRIPTION OF THE VULNERABILITY An attacker can force a read at an invalid address via Loop (...). -
Global Security 10/21/2019 04:34
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can trigger a Cross Site Scripting of Joomla Kunena, in order to run JavaScript code in the context of the web site. Impacted products: Joomla Extensions not comprehensive. Severity: 2/4. Consequences: client access/rights. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 19/08/2019. DESCRIPTION OF THE VULNERABILITY (...). -
Global Security 10/21/2019 04:25
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY An attacker can trigger a Cross Site Scripting of Drupal Scroll To Top, in order to run JavaScript code in the context of the web site. Impacted products: Drupal Modules not comprehensive. Severity: 2/4. Consequences: client access/rights. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 19/08/2019. DESCRIPTION OF THE (...). -
Global Security 10/21/2019 04:21
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Fedora, MariaDB precise, openSUSE Leap. Severity: 2/4. Consequences: user access/rights, denial of service on service, denial of service on client. Provenance: intranet client. Confidence: confirmed by the editor (5/5). Creation date: 19/08/2019. DESCRIPTION OF THE VULNERABILITY An attacker can force the usage of a freed memory area via (...). -
Global Security 10/21/2019 04:20
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: openSUSE Leap, SUSE Linux Enterprise Desktop, SLES. Severity: 2/4. Consequences: denial of service on service, denial of service on client. Provenance: privileged account. Confidence: confirmed by the editor (5/5). Creation date: 19/08/2019. DESCRIPTION OF THE VULNERABILITY An attacker can trigger a fatal error via MASTER Type Zone Record (...). -
Global Security 10/20/2019 05:52
Centrify announced results of an onsite poll conducted during GITEX 2019. Overall, a majority of respondents indicated that Privileged Access Management (PAM) was important for their organization, with more than 90% of respondents indicating that PAM is important in their overall cybersecurity strategy. However, while the importance of PAM was indicated by the respondents, their real-life adoption and usage of PAM was found to be much less. Only 35% of the respondents confirmed that (...). -
Global Security 10/18/2019 10:00
Today the government has announced new investments that will help make the UK a world leader in tackling many forms of cyber security threats. You can find out more here. The comment from Rob Norris, VP Enterprise and Cyber Security, Fujitsu. “This continued investment in cyber security is proof that the issue is being taken seriously at the highest level. The collaboration between the government and organisations is an encouraging one - and with technological innovation speeding up, this (...). -

Automotive Industries

Business Issues

Companies - Public

Companies - Venture Funded

Global Markets

Government Agencies

Information Technologies

Job Titles

Legal and Regulatory

Market Research Topics

Political Entities

Sources

Strategic Scenarios

Trends