|
Based on a recent survey conducted by Enterprise Management Associates (EMA), organizations are confused about what privileged access management (PAM) is and whether they...
|
|
|
Ayehu is working to bridge the gap between IT Operations and Security Operations. We expect to see more vendor product offerings follow suit.
|
|
|
Symantec recently announced new features for its Integrated Cyber Defense Platform aimed at boosting DLP strategies in the cloud via zero trust technologies from Luminate,...
|
|
|
A hacker has compromised 106 million Capital One customers after a data breach. But the real story might be less to do with cloud security itself and more to do with...
|
|
|
This tool will help you organize the data handling requirements for users throughout each phase of data's lifecycle.
|
|
|
This tool will help you verify the classification levels of your data by ensuring a balance of protection for sensitive data with limited cost and user friction.
|
|
|
The US Federal Trade Commission announced both a $5-billion settlement with Facebook and a $575-million penalty against Equifax in the same week. Both were for data...
|
|
|
TrustArc’s introduction of Privacy Profile aims to solve an ongoing problem privacy professionals have: identifying all applicable regulations.
|
|
|
Apple has delivered a silent update to Macs, rectifying a security flaw in its Zoom web-conferencing service.
|
|
|
Micro Focus’s new offering, AD Bridge, extends AD policies and account management to Linux machines, simplifying identity and access management (IAM) for organizations...
|
|