A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever the motivation,... Read more »
PCI Security Standards Council (PCI SSC) published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard is one of two... Read more »
As companies are modernizing their tech stacks, many are unwittingly putting their business and customers at risk. Why? Because technology moves faster than teams can keep pace and it’s... Read more »
More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, according to Zscaler.... Read more »
OPSWAT announced that its MetaDefender Email Gateway Security solution is now available from the cloud as a service, known as MetaDefender Cloud Email Security. This new offering gives organizations... Read more »
HackNotice unveils new platform features, a new logo and wordmark, dark mode, personalized dashboards, risk meters, easier-to-understand alerts, more powerful monitoring, continuous phishing with the press of a button,... Read more »
Delinea announced new features for Privilege Manager, its solution for managing privileged access on Windows and Mac workstations. Updates in this release include improvements to the native MacOS agent,... Read more »
Rezilion has updated MI-X, its open-source tool developed by Rezilion’s vulnerability research team. Available as a download from the Github repository, MI-X already has more than 100 stars on... Read more »
Cradlepoint unveils its third NetCloud Exchange (NCX) solution, Zero Trust Network Access. NCX ZTNA ensures a native ZTNA experience that offers simplicity, efficiency, and granularity for Cradlepoint deployments. While... Read more »
Beyond Identity and Zscaler joint solution strengthens a zero trust architecture and reduces the attack surface by continuously validating the user and device and enabling secure access to applications.... Read more »