Millie
your market intelligence analyst
Search Results
Edit Save
3,747 results
Global Security 08/11/2020 13:01
Ivanti announced enhanced capabilities for the Ivanti® Enterprise Service Management portfolio, which includes service management, asset management and automation solutions. The new releases give service desks greater visibility, in real time, to actionable information across their device estate to improve the accuracy, speed and efficiency of services delivered. This leads to better outcomes and can resolve up to 80% of issues before users report them through the use of automation bots. (...). -
Global Security 08/11/2020 09:54
DigiCert, Inc. announced a new Multi-year Plan of up to six-year coverage for TLS certificate purchases in the DigiCert CertCentral® TLS Manager. The Multi-year Plan simplifies certificate purchasing and renewal processes for customers and partners ahead of Sept. 1, when browsers will shorten maximum certificate lifetimes to one year. Multi-year Plan eliminates the need for annual per-certificate purchases, achieves cost savings via Multi-year Plan discounts and takes advantage of (...). -
Global Security 08/11/2020 09:25
Chartered Certified accountancy firm, Bache Brown & Co, has implemented a suite of cybersecurity and IT tools to protect client data as it adopts flexible remote working practices. The West Midlands-based business has over 25 years' experience in providing accounting, tax and business advice to small and medium-sized businesses. With financial firms targeted by cybercriminals more and more, Bache Brown decided to take a proactive stance against any potential security risks by asking OGL (...). -
Global Security 08/11/2020 09:20
This bulletin was written by Vigil@nce : https://vigilance.fr/computer-vulne... SYNTHESIS OF THE VULNERABILITY Impacted products: Debian, WordPress Core. Severity: 2/4. Consequences: client access/rights, data reading. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 11/06/2020. DESCRIPTION OF THE VULNERABILITY An attacker can use several vulnerabilities of WordPress Core. ACCESS TO THE FULL VIGIL@NCE BULLETIN (...). -
Global Security 08/11/2020 08:49
The Federal Antimonopoly Service (FAS) of Russia has made a ruling on Apple's violation of the antimonopoly legislation at the request of Kaspersky. The FAS reviewed the complaint filed by Kaspersky in March 2019 and issued an order to Apple to eliminate the violations identified during the antitrust investigation. The complaint concerned barriers created by Apple in the form of (1) unjustified refusals to parental control app developers in the use of instruments and capabilities that Apple (...). -
Global Security 08/11/2020 08:39
Equinix, Inc. announced its expansion into India through the acquisition of the India operations of GPX Global Systems, Inc. (“GPX India”). The all-cash transaction value of US$161 million represents a multiple of approximately 15x the projected EBITDA at full utilization. The acquisition is expected to close in Q1 2021, subject to customary closing conditions including regulatory approval. The acquisition will extend Platform Equinix® to India with the addition of two world-class, highly (...). -
Global Security 08/11/2020 07:00
This bulletin was written by Vigil@nce : https://vigilance.fr/?langue=2 SYNTHESIS OF THE VULNERABILITY Impacted products: Drupal Modules not comprehensive. Severity: 2/4. Consequences: client access/rights. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 11/06/2020. DESCRIPTION OF THE VULNERABILITY An attacker can trigger a Cross Site Scripting of Drupal Open ReadSpeaker, in order to run JavaScript code in the context of the (...). -
Global Security 08/11/2020 06:58
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Drupal Modules not comprehensive. Severity: 2/4. Consequences: privileged access/rights, user access/rights. Provenance: internet client. Confidence: confirmed by the editor (5/5). Creation date: 11/06/2020. DESCRIPTION OF THE VULNERABILITY An attacker can bypass restrictions via Brute Force of Drupal YubiKey, in order to escalate (...). -
Global Security 08/11/2020 03:27
Government data and asset managers in Australia and New Zealand have a new option for removing confidential data from drives and devices when it is no longer needed: Data erasure software from Blancco Technology Group. Blancco's Drive Eraser version 6.9.1 recently achieved Common Criteria security certification through the Australasian Information Security Evaluation Program (AISEP). It is now recognized on the Common Criteria Portal's Certified Products List and considered an ‘Evaluated (...). -
Global Security 08/11/2020 03:25
Tenable®, Inc. published a global industry study that revealed the vast majority of Saudi Arabian organizations (95%) have experienced a business-impacting cyberattack in the past 12 months, according to both business and security executives. The data is drawn from ‘The Rise of the Business-Aligned Security Executive,' a commissioned study of more than 800 global business and cybersecurity leaders, including 49 respondents in Saudi Arabia, conducted by Forrester Consulting on behalf of (...). -
Global Security 08/10/2020 13:30
F-Secure is authorized by the CVE Program to assign Common Vulnerability and Exposures (CVE) identifiers as a CVE Numbering Authority (CNA). CNAs are organizations authorized by the CVE Program to assign CVE IDs to vulnerabilities affecting products within their distinct, agreed-upon scope. CVEs are publicly disclosed security flaws. Without careful coordination in how these flaws are disclosed, security researchers and software vendors risk providing sensitive information about (...). -
Global Security 08/10/2020 12:45
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Linux, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES. Severity: 2/4. Consequences: administrator access/rights, denial of service on server. Provenance: user shell. Confidence: confirmed by the editor (5/5). Creation date: 10/06/2020. DESCRIPTION OF THE VULNERABILITY An attacker can force the usage of a freed memory (...). -
Global Security 08/10/2020 12:43
Netwrix to announce the appointment of Simon Pearce as the Vice President of EMEA and APAC regions. In his new position, Pearce will lead the transformation of the Netwrix Sales and Channel strategy for the EMEA and APAC regions. His main goal will be to drive closer relationships to customers, improve Sales and Channel enablement as well as Partner Marketing. By building a consistent programme that creates highly effective relationships with key partners in the region, Pearce will also (...). -
Global Security 08/10/2020 12:41
CyberArk announced it was named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management1, positioned both highest in ability to execute and furthest in completeness of vision for the second time in a row. CyberArk delivers the most comprehensive solution for protecting privileged accounts, credentials and secrets associated with humans, applications and machines across cloud and hybrid environments. As the global leader in privileged access management, CyberArk (...). -
Global Security 08/10/2020 09:03
The Kaspersky Q2 2020 DDoS attacks report has revealed that the number of DDoS attacks in the second quarter of 2020 increased three-fold in comparison to Q2 2019. The figure is almost the same as the number of DDoS attacks in Q1 2020. Kaspersky experts believe the rise in malicious activity can be attributed to the impact of COVID-19, as both cybercriminals and their targets have had to reconsider their summer plans. The pandemic, and subsequent social distancing restrictions, have (...). -
Global Security 08/10/2020 05:26
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: Debian, Fedora, Slackware, Ubuntu. Severity: 2/4. Consequences: data reading, denial of service on service, denial of service on client. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 10/06/2020. DESCRIPTION OF THE VULNERABILITY An attacker can force a read at an invalid address via (...). -
Global Security 08/10/2020 05:24
This bulletin was written by Vigil@nce : https://vigilance.fr/computer-vulne... SYNTHESIS OF THE VULNERABILITY Impacted products: Android OS, Linux, Ubuntu. Severity: 2/4. Consequences: data reading, denial of service on server, denial of service on service, denial of service on client. Provenance: user shell. Confidence: confirmed by the editor (5/5). Creation date: 10/06/2020. DESCRIPTION OF THE VULNERABILITY An attacker can force a read at an invalid (...). -
Global Security 08/10/2020 05:22
The future of the workplace is undoubtedly a remote workforce, accessing the corporate network via mobile devices and the cloud. This is likely to cause a few sleepless nights for the teams traditionally responsible for managing network security on-premise. With remote working, data breaches will become commonplace. Networks will be infiltrated with malware due to an increase in roaming or off-network access. Vulnerable and unsecure At the root of many of these breaches, and the (...). -. /
Global Security 08/10/2020 03:59
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: SQLite. Severity: 2/4. Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client. Provenance: user account. Confidence: confirmed by the editor (5/5). Creation date: 08/06/2020. DESCRIPTION OF THE VULNERABILITY (...). -

Chemicals - Agricultural

Chemicals - Industrial

Business Issues

Companies - Public

Companies - Venture Funded

Commodity Prices

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Information Technologies

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications