Enterprise Security News
Ivanti Study Shows Enterprise IT Teams, Workers May Be Losing Cyber War on Phishing
Since the pandemic, companies are undergoing a surge in cybersecurity attacks – particularly in phishing. A recent survey from Ivanti details the issue, and makes some recommendations.
Full Story >MemSQL Expands Collaboration with AWS, Red Hat To Support Cloud-Based Operational Analytics
MemSQL is available on Marketplaces at AWS and Red Hat to spur adoption. MemSQL, 7.1 leverages Amazon EC2 and S3 for real-time operational analytics. MemSQL from the Red Hat Marketplace is optimized for Kubernetes.
Full Story >Ping Intelligent Identity Platform Adds Integrations, Guides To Ease Delivery of Zero Trust Security
Ping Identity is adding support for Zero Trust security with new capabilities, practical guidance, and technology integrations. Further, IDN looks at Ping’s latest offering combines the worlds of identity and intelligence
Full Story >Venafi Survey Finds Management, Auditing for Keys and Certificates Lags Usernames and Passwords
A recent survey by Venafi has shown that organizations are failing to protect keys and certificates as effectively as they do with usernames and passwords. While 85% of security professionals have policies to govern password length for human identities, just over half govern keys for machine identities.
Full Story >PingCentral Makes Self-Service IAM a Reality with Simple Templates, Workflows
Ping Identity is enabling a ‘self-service’ approach to help overstretched IT and security admin teams meet security and access management requirements.
Full Story >Centrify Delivers Free SaaS-Based Privileged Access Management for Small Businesses
Security provider Centrify is delivering a free edition of its cloud-based Privileged Access Service, the company’s enterprise-grade privileged access management service. Centrify’s Free Tier Vault aims to help smaller firms eliminate password spreadsheets and harden security postures.
Full Story >Axiomatics Latest Updates Improve Delivery of Dynamic Authorization for Hybrid, Cloud Environments
Axiomatics is improving the delivery of dynamic authorization for multiple assets across hybrid, cloud and on-prem environments. IDN looks at the latest Axiomatics Policy Server and other updates with company execs.
Full Story >In an eye-opening report, Accenture suggests that the rate of innovation has become so profound that the time many have come for an “Internet refresh” – from the bottom up. Among the stats: Only 30% of companies are “very confident” in their internet security protection. IDN reviews the highlights.
Full Story >Okta’s Identity Cloud Updates Aim To Better Secure Against Credential Theft, Account Takeover
Okta is updating the Adaptive Multi-Factor Authentication capabilities of its Okta Identity Cloud. The updates aim to help ensure only the proper people get access to the right resources – and at only the appropriate time.
Full Story >Growing CyberSecurity Skills Gap Worries Security Professionals; Highlights Challenges for Staffing
A recent survey on security staff confirms what we all know – IT is growing even more worried that these professionals are so hard to find, hire and keep. But the survey, commissioned by Tripwire, also found the shortage is prompting companies to their methods for how to protect against cyberattacks.
Full Story >News of the Verizon data breach is just the latest reminder of how tough it is for CIOs and CISOs to balance ‘security’ vs ‘innovation’ in the age of digital transformation and hybrid (borderless) architectures. One Identity’s Todd Peterson shares 4 proven strategies for how security professionals can be responsive to business initiatives -- without compromising on security needs.
Full Story >With Ansible Automation, Red Hat Insights Can Resolve Critical Infrastructure Outages Security Risks
Red Hat Insights cloud-based service is integrating with Ansible ‘playbooks’ to deliver abilities to automatically remediate outages or other issues that can impact infrastructure security, performance, and stability.
Full Story >Showing 1 - 12 of 18