<
>

Posts in Taxonomies

CyberArk Expands Availability of Identity Security Offerings on AWS Marketplace

CyberArk, the global leader in Identity Security, announced the availability of CyberArk Cloud Entitlements Manager, CyberArk Endpoint Privilege Manager and CyberArk Workforce Identity on...

WatchGuard Unveils New Endpoint Security Product Family Within WatchGuard Cloud, Just One Year After Panda Acquisition

WatchGuard Technologies, a global leader in network security and intelligence, multi-factor authentication (MFA), advanced endpoint protection, and secure Wi-Fi, announced that it has integrated the...

Addressing 5G Security with Threat Modelling - Synopsys

5G is fundamentally different from 4G, LTE, or any other network the telecommunications industry has ever seen before. It promises data rates 100 times faster than 4G, network latency of under 1...

Prisma Cloud Launches ML-Powered Next-Generation Cloud Security Posture Management Capabilities

New updates to Prisma Cloud, Palo Alto Networks Cloud Security Posture Management (CSPM) solution, help eliminate dangerous cloud blind spots and free security teams from the burden of alert...

CyberArk Advances Industry-Leading Identity Security Platform

CyberArk, the global leader in Identity Security, announced major advancements to the CyberArk Identity Security Platform to help secure high-risk access and broaden protection across cloud and...

Claroty Unveils First Zero-Infrastructure Cybersecurity Solution to Protect Industrial Enterprises

Claroty, the industrial cybersecurity company, announced Claroty Edge, a new, patent-pending addition to The Claroty Platform that delivers 100% visibility into industrial networks in minutes without...

How Secure Authentication and Authorisation is More Than Identity Management

Authored by: Peter Löfling, General Manager APAC, Varnish Software Authentication and authorisation policies exist in companies of all types and sizes to govern access control and who can...

Why Organisations Can’t Ignore Open Source Security

Authored by: Ian Hall, Asia-Pacific Client Services Manager, Synopsys Software Integrity Group    Open source software provides the foundation for the vast majority of applications...

The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage

IntSights, the threat intelligence company focused on enabling enterprises to Defend Forward, released a research around The Evolving Ransomware Threat: What Business Leaders Should...

EfficientIP and IDC: Threat Actors Diversify Their Toolkits Throughout Pandemic with DNS Attacks Costing Nearly US$1 Million Each

EfficientIP, a leading provider of network security and automation solutions specialising in DDI (DNS-DHCP-IPAM), announced the results of its 2021 Global DNS Threat Report. The annual research,...

Pages