What stolen info can be bought off the dark web, and for how much?

Privacy Affairs researchers concluded criminals using the dark web can get a complete set of a person’s account details, enabling them to create fake IDs and forge private documents,... Read more »

New infosec products of the week: June 24, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Arcserve, Cavelo, ComplyCube, CompoSecure, and Hillstone Networks. Arcserve N Series appliances allow organizations to... Read more »

iPaaS: The latest enterprise cybersecurity risk?

iPaaS apps are vulnerable because they transport highly sensitive data from core systems, include many different third-party apps in the process, and often lack security tools to govern and... Read more »

How companies are prioritizing infosec and compliance priorities

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for which companies prioritize information security... Read more »

Risky behavior reduced when executives put focus on identity security

Managing identities accessing enterprise resources has become significantly more complicated over the last several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the... Read more »

Despite known security issues, VPN usage continues to thrive

VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a... Read more »

Ermetic enables organizations to provide secure JIT access to cloud environments for developers

Ermetic announced the Ermetic Platform now enables organizations to automate the process of granting developers and DevOps teams “Just in Time” (JIT) access to cloud infrastructure environments. These new... Read more »

Palo Alto Networks adds new cloud security features to help organizations secure web applications

Over the last two years, organizations have expanded their use of cloud environments by more than 25%. Many are now struggling to manage the technical complexity of cloud migration,... Read more »

Mitek Verified Identity Platform protects customers against identity theft

As consumers transact more business online than ever, identity verification has become essential to safe digital access. Now Mitek is making it possible for companies to protect customers’ digital... Read more »

Hypori Halo 2022.1 provides secure access to mobile applications and data from any device

Hypori announced the new release of Hypori Halo 2022.1 for strengthened security, simplified onboarding, and enhanced user experience. Hypori Halo provides secure access to mobile applications and data from... Read more »
Subscribe to our Newsletter