Millie
your market intelligence analyst
Search Results
Edit Save
3,152 results
Global Security 02/25/2020 01:57
ManageEngine announced the launch of Access Manager Plus, a privileged session management solution for enterprises. With features like jump box support, session recording and live monitoring, the solution allows security admins to facilitate and govern remote sessions that provide users with privileged access to critical business systems. Remote connectivity has become mainstream as employees increasingly access corporate systems at their convenience, irrespective of their location or the (...). -
Global Security 02/24/2020 10:31
F5 introduced its customer-focused approach to Application Protection, bolstered by new offerings and the company's recent acquisition of Shape Security. Informed by customer use cases, prominent industry attack practices, and threat intelligence from F5 Labs, F5's extensive portfolio safeguards all applications without impacting the end-user experience or slowing time-to-market. As a leader in WAF and API security technology, F5 delivers application security with consistent policies and (...). -
Global Security 02/24/2020 10:25
A consortium of seven European specialist partners from Spain, Italy, The Netherlands and France has been selected to deliver a new EU Shift2Rail Programme funded through Horizon 2020. Started in December 2019 and officially launched in Barcelona in January 2020, 4SECURail is co-ordinated by engineering consulting firm Ardanuy Ingeniería, S.A., in collaboration with CNR, FIT, Hit Rail, SIRTI, Tree Technology and UIC. The 4SECURail consortium will deliver a co-designed collaborative process (...). -
Global Security 02/24/2020 10:12
FireMon announced new integrations with Microsoft Azure and Amazon Web Services (AWS) to help improve cloud visibility, reduce complexity and match the pace needed to protect systems from ongoing cyber threats and data breaches. Through FireMon's new Microsoft Azure and AWS integrations, its customers are now able to take advantage of a single, policy-driven platform to secure multi-cloud and hybrid environments, which includes: • Rapid rule creation to manage cloud traffic (...). -
Global Security 02/24/2020 09:23
Claroty announced today that CRN®, a brand of The Channel Company, has named Claroty to its annual Security 100 list. This list identifies the top security vendors in the IT channel. Honorees are chosen based on their impact in each of these categories: Identity Management and Data Protection; Endpoint Security; Network Security; Web, Email and Application Security; and SIEM, Risk and Threat Intelligence. These leading Security 100 companies push the limits, bringing innovative and (...). -
Global Security 02/24/2020 08:13
Cisco unveiled a radical simplification in the way customers experience Cisco Security's portfolio and addresses complexity —one of the top pain points for CISOs. Building on a decade of significant investment in innovation, partnerships, acquisitions, customer research and open-source standards, Cisco is now offering customers the broadest, most integrated cloud-native security platform in the industry, Cisco SecureX. Cisco SecureX provides a comprehensive user experience across the (...). -
Global Security 02/24/2020 08:11
Cisco published its sixth annual CISO Benchmark Report surveying the security posture of 2,800 security professionals from 13 countries around the globe. The report provides 20 cybersecurity considerations for 2020 – gleaned from data analysis of survey results and a panel of Advisory CISOs. Complexity Continues to be Cybersecurity's Worst Enemy Digital transformation continues to present itself as an opportunity for IT and security leaders to innovate and gain competitive advantage. But it (...). -
Global Security 02/24/2020 03:46
IDEX Biometrics ASA announced the launch of TrustedBio™ — a new family of dual-interface products and solutions designed to reduce biometric smartcard cost while improving both performance and security. Card cost and manufacturing complexity has been a barrier to mass adoption of biometric smartcards. Now, thanks to the unprecedented integration levels of IDEX's new TrustedBio™ solutions, the cost of building a biometric smartcard product will be dramatically reduced, which will accelerate (...). -
Global Security 02/24/2020 02:20
Mocana Corporation announced the launch of Mocana TrustCenter™ 2020, the end-to-end Cyber Protection as a Service for Trustworthy Systems. OT and IoT systems need a trusted platform for digital transformation of legacy brownfield and greenfield devices to enable multi-access edge computing and 5G broadband gateways and devices. The device manufacturers, vendors, owners and operators of devices are grappling with privacy, security, and compliance regulations to avoid cataclysmic service (...). -
Global Security 02/24/2020 02:09
This bulletin was written by Vigil@nce : https://vigilance.fr/computer-vulne... SYNTHESIS OF THE VULNERABILITY Impacted products: BIG-IP Hardware, TMOS. Severity: 2/4. Consequences: privileged access/rights. Provenance: user account. Confidence: confirmed by the editor (5/5). Creation date: 23/12/2019. DESCRIPTION OF THE VULNERABILITY An attacker can bypass restrictions via iRules of F5 BIG-IP, in order to escalate his privileges. ACCESS TO THE FULL (...). -
Global Security 02/24/2020 02:02
This bulletin was written by Vigil@nce : https://vigilance.fr/?langue=2 SYNTHESIS OF THE VULNERABILITY Impacted products: OTRS Help Desk. Severity: 1/4. Consequences: user access/rights. Provenance: user account. Confidence: confirmed by the editor (5/5). Creation date: 07/02/2020. DESCRIPTION OF THE VULNERABILITY Background tasks are counted for SessionMaxIdleTime of OTRS Help Desk, so an attacker can ensure that his session will never expire. ACCESS TO (...). -
Global Security 02/24/2020 01:59
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: RHEL. Severity: 2/4. Consequences: user access/rights, denial of service on service, denial of service on client. Provenance: document. Confidence: confirmed by the editor (5/5). Creation date: 23/12/2019. DESCRIPTION OF THE VULNERABILITY An attacker can trigger a buffer overflow via make_canonical() of libyang, in order to (...). -
Global Security 02/24/2020 01:58
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer... SYNTHESIS OF THE VULNERABILITY Impacted products: BIG-IP Hardware, TMOS. Severity: 2/4. Consequences: denial of service on server, denial of service on service. Provenance: intranet client. Confidence: confirmed by the editor (5/5). Creation date: 23/12/2019. DESCRIPTION OF THE VULNERABILITY An attacker can trigger a fatal error via Virtual Edition Virtio Direct Descriptors of (...). -
Global Security 02/21/2020 07:02
In light of the news that The Department of Defence agency responsible for securing the communications of President Trump has suffered a data breach, the commentary from David Emm, Principal security Researcher at Kaspersky. “The news that a US Government agency has been breached highlights that no organisation, authoritative body, business or individual is immune from cyberattacks. And with our recent research showing that less than a third of businesses (31%) and charities (32%) in the UK (...). -
Global Security 02/21/2020 06:31
WorldStream has joined industry association DHPA, Trusted Cloud Experts. WorldStream sees the increasing scale of its own company as well as the need for a hosting industry-wide approach to cybercrime as important arguments for membership of DHPA. The members of DHPA are among the largest, most innovative cloud and hosting providers in the Netherlands. After its founding in 2006, WorldStream has experienced a significant growth, especially since 2016 when the company started offering (...). -
Global Security 02/21/2020 04:36
Kaspersky researchers have detected an unusual malicious campaign that uses a phishing copy of a popular VPN service's website to spread AZORult, a Trojan stealer, under the guise of installers for Windows. The campaign, which kicked off at the end of November 2019 with the registration of a fake website, is currently active and focused on stealing personal information and cryptocurrency from infected users. This shows that cybercriminals are still hunting for cryptocurrency, despite reports (...). -
Global Security 02/21/2020 03:36
Yesterday there was news that the Department of Defense was hit with a data breach. The personal data of about 200,000 people, including names and Social Security numbers, may have been compromised, though the agency said it has no evidence data was stolen. The breach was disclosed in a letter to those who were affected. The breach occurred between May and July 2019 on a system hosted by the Defense Information Systems Agency (DISA). Following this news, Chris Morales, head of security (...). -
Global Security 02/21/2020 02:09
This bulletin was written by Vigil@nce : https://vigilance.fr/computer-vulne... SYNTHESIS OF THE VULNERABILITY Impacted products: openSUSE Leap, SLES, Ubuntu. Severity: 1/4. Consequences: denial of service on service. Provenance: user shell. Confidence: confirmed by the editor (5/5). Creation date: 06/02/2020. DESCRIPTION OF THE VULNERABILITY An attacker can create a memory leak via button_open of systemd, in order to trigger a denial of service. ACCESS TO (...). -
Global Security 02/21/2020 02:01
A cyber-attack has hit the major facilities company ISS World, which has half a million employees worldwide. ISS provides cleaning, catering, security and other services to companies in the UK and elsewhere. Its websites have been down since 17 February. And This Week in Facilities Management said 43,000 staff at London's Canary Wharf and its Weybridge HQ, in Surrey, still had no email. Ransomware attacks encrypt IT systems, locking users out and demanding money. The company says that (...). -
Global Security 02/20/2020 12:50
WhiteCanyon Software, the data erasure and computer diagnostic software provider, announced that WipeDrive has received certification by the UK National Cyber Security Centre (NCSC) in the Commercial Product Assurance scheme (CPA). WipeDrive has completed a rigorous independent testing process validating its ability to permanently erase data from hard drives. It also verified the overwrite patterns WipeDrive implements and the resulting certified report. This assessment recognizes (...). -

Food and Human Nutrition

Business Issues

Companies - Public

Companies - Venture Funded

Commodity Prices

Financial Results

Global Markets

Global Risk Factors

Government Agencies

Information Technologies

Legal and Regulatory

Products - Animal

Products - Plant

Political Entities

Strategic Scenarios

Sources

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications