DigiCert announced its next generation Discovery, a set of key capabilities in DigiCert Trust Lifecycle Manager that enable customers to build a centralized book of record of their cryptographic... Read more »
IDEMIA announced the development of a secure, standards-based converged access card for the enterprise access market, in collaboration with HYPR and Wavelynx. The creation of this smart credential will... Read more »
Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Flexxon, Fortanix, Fortinet, SailPoint, and Vanta. Flexxon Xsign protects sensitive data reserved only... Read more »
In an era where data security is paramount, the recent revelations about firmware backdoors implanted by Chinese government-backed hackers serve as a stark reminder of the evolving threat landscape.... Read more »
60% of companies are ‘very’ to ‘extremely’ concerned about ransomware attacks, according to latest research from Hornetsecurity. Businesses acknowledge ransomware risk Hornetsecurity revealed that 92.5% businesses are aware of... Read more »
In this Help Net Security video interview, David Hunt, CTO at Prelude, discusses his book – Irreducibly Complex Systems: An Introduction to Continuous Security Testing. Continuous security testing (CST)... Read more »
Companies are losing revenue in the fight against malicious bot attacks, according to survey by Kasada. Despite spending millions of dollars on traditional bot management solutions, companies are still... Read more »
Snow Software released new innovations available on Snow Atlas to empower customers with the intelligence to optimize growing SaaS and cloud infrastructure spend and reduce data leakage in the... Read more »
Druva has formed a strategic partnership with NEXTGEN to expand Druva’s footprint in Australia, New Zealand, and the Philippines, delivering data protection solutions to an even broader range of... Read more »
CyberArk has released new capabilities for securing access to cloud services and modern infrastructure for all users, based on the company’s risk-based intelligent privilege controls. Included are major enhancements... Read more »
