Gartner names Ping Identity leader in access management
The solution includes authentication and single sign-on, MFA, access security, directory, intelligent API security and data governance capabilities that work together.
F5 Networks' BIG-IP load balancer product vulnerable to attack
CrowdStrike report lists cybersecurity adversary rankings
Gartner, Forrester name Retarus for Email Security
Slack tackles balance between productivity and security
ForgeRock launches open-source IoT edge controller solution
OutSystems gains new certifications for cloud security compliance
Cohesity launches new vulnerability scan using backup data
The application works by scanning backup copies on to identify any vulnerabilities across an organisation’s IT environment.
Successful threat hunting requires curation & collaboration
Many organizations already have the technology required for threat hunting, with SIEMs and threat intelligence a starting point.
Popular enterprise printers riddled with security risks
Researchers from NCC Group analysed different aspects of six mid-range enterprise printers manufactured by HP, Ricoh, Xerox, Lexmark, Kyocera, and Brother.
Microsoft and CyberArk lead GlobalData identity management theme
Both companies gained the highest score for the identity management theme in GlobalData’s Thematic Scorecard for the security software sector.
67b emails rejected due to 'highly malicious attack techniques'
Out of 160 billion emails analysed, 42% were rejected.
Rubrik enters data governance and disaster recovery orchestration market
Sonar addresses the intensifying risk of data privacy breaches and compliance penalties by applying machine learning to discover sensitive data.
SecurityScorecard launches custom security ratings feature
Custom Scorecard allows enterprise leaders to better isolate and focus on cybersecurity risk issues by business units and/or subsidiaries.
SentinelOne launches next-gen server protection offering
SentinelOne has released a new next-generation server and protection offering, which is purpose-built for containers.
Venafi announces guarantee for no certificate-related outages
Eliminating certificate-related outages within complex, multi-tiered architectures can feel like an impossible effort.
Broadcom set to own Symantec’s enterprise security business for $10.7B
"M&A has played a central role in Broadcom's growth strategy and this transaction represents the next logical step in our strategy following our acquisitions of Brocade and CA Technologies," says Broadcom CEO
Genetec shows impressive growth, says IHS Markit
IHS has named Genetec one of the fastest-growing access control software manufacturers in the world, according to the latest IHS Report.
New research highlights third party risks facing organisations
modern risk management must account for ongoing changes in third-party relationships and mitigate risks in an iterative way — that is, on a continual basis, rather than at specified intervals."
CEOs falsely led to believe company is GDPR compliant - Delphix
Delphix spoke to CISOs, CIOs, testers and developers at UK companies to find out the state of play at their organisations.
Nintex bolstered by independent security report
Nintex Workflow Cloud’s security controls are up to scratch, with not one single instance where a security control wasn’t working, or not in place.
The fascinating way Microsoft is making a social impact
Microsoft is upending how tech companies approach the not-for-profit, NGO and charity sector with a revolutionary new approach
Ping Identity launches private cloud identity solution
Enterprises need a dependable way for customers, employees and partners to conveniently sign-on to their services and applications.
Yubico launches lightning-compatible security key
Today, the YubiKey 5Ci can be used to secure the 1Password, Bitwarden, Dashlane, Idaptive, LastPass, and Okta iOS mobile applications.
Security teams spend 25% of their time chasing false positives
The report also showed that teams were also concerned about investigating actionable intelligence and building incident timelines as well as cleaning, fixing and/or patching networks.
More than half of personal data breaches caused by human error
"The biggest cause of breaches remains the fallibility of people and an inherent inability of employees to send emails to the right person."