Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now An advanced persistent threat (APT) is ...
Cloudflare has been steadily expanding its portfolio of security services over the last several years. One thing that has been missing, however, is cloud security posture management (CSPM), which is a ...
Every few years, the cybersecurity industry invents a new acronym to keep pace with innovation. We’ve seen Cloud Security Posture Management (CSPM) and Data Security Posture Management (DSPM). Now, as ...
Corporate businesses have an obligation to protect the privacy of all employees and ensure their personal security on the job. Publicly traded companies can also benefit from putting policies in place ...
From vendors offering identity and data security to providers of security service edge, here’s a look at 20 key companies in identity, access and data security. If the growth of the identity and ...
Cloud-based security technology company Brivo Inc. today announced the launch of Brivo Security Suite, a unified platform that simplifies security management by integrating access control, video ...
Gerry Gebel, Strata Identity Head of Standards, former Burton Group analyst and tech executive at Chase Manhattan Bank (now JPMorgan Chase). Identity has undergone a remarkable transformation in ...
It’s one thing to establish a security program that meets the needs of your organization. It’s quite another to successfully embed the principles of that program into the very DNA of your organization ...
Patch management approaches that aren't data-driven are breaches waiting to happen. Attackers are weaponizing years-old CVEs because security teams are waiting until a breach happens before they ...
Single sign-on (SSO) is a centralized session and user authentication service in which one set of login credentials can be used to access multiple applications. Its beauty is in its simplicity; the ...
The ‘Security for Management’ PPT template follows the commonly accepted NIST Cyber Security Framework as an overall outline and includes open sections that are to be completed with respect to each ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results