Satori launches new KPI to track ungoverned data with Access Manager

Satori has unveiled its new Access Manager, a centralized place for customers to manage data use and track the percentage of ungoverned traffic, which is data that is accessed... Read more »

Hitachi Vantara’s Cloud Security Services protect cloud application workloads

Hitachi Vantara has expanded the Hitachi Application Reliability Centers (HARC) portfolio of consulting and managed services with new Cloud Security Services. This new set of application security services offer... Read more »

Uptycs CWPP adds agentless scanning

Uptycs added agentless scanning, offering customers more options to secure their cloud workloads. Customers can now use both deployment options, agent-based and agentless, to solve their organizations’ cloud security... Read more »

December 2022 Patch Tuesday forecast: Fine-tuning the connectivity

Microsoft wrapped up a lot of ‘loose ends’ last month with their November set of updates, but there is still some work to do before the end-of-year holiday season.... Read more »

New infosec products of the week: December 9, 2022

Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Arkose Labs, Kudelski Security, Lepide, OPSWAT, Palo Alto Networks, and Thales. OPSWAT MetaDefender... Read more »

Research reveals where 95% of open source vulnerabilities lie

New research from Endor Labs offers a view into the rampant but often unmonitored use of existing open-source software in application development and the dangers arising from this common... Read more »

Insights into insider threats: Detecting and monitoring abnormal user activity

A cyber security risk that comes from within an organization is referred to as an insider threat. Insider threats might be carried out purposefully or accidentally. Whatever the motivation,... Read more »

PCI Secure Software Standard 1.2 released

PCI Security Standards Council (PCI SSC) published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard is one of two... Read more »

Why automation is critical for scaling security and compliance

As companies are modernizing their tech stacks, many are unwittingly putting their business and customers at risk. Why? Because technology moves faster than teams can keep pace and it’s... Read more »

Leveraging the full potential of zero trust

More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, according to Zscaler.... Read more »
Subscribe to our Newsletter