Linode appoints Joseph Zhou as CISO
Linode appointed Joseph Zhou as Chief Information Security Officer (CISO). Zhou will lead all aspects of security risk management for Linode, including enterprise security …
Product showcase: ESET Cybersecurity Awareness Training
Engaging training scenarios, plus robust phishing simulation and reporting capabilities ESET is a market-leading cybersecurity provider, offering a comprehensive security …
Most businesses to accelerate data security investments in 2021
71 percent of enterprise executives reported their organization’s data and AI timelines have accelerated since the onset of the COVID-19 pandemic, with one in four reporting …
How to secure data one firewall at a time
The need for secure data access management is top-of-mind in the C-suite and boardroom. The question I keep hearing from IT departments is how to do it right, that is, how to …
Kensington’s cross-platform solutions enable secure biometric authentication for any device
Kensington introduced two new cross-platform solutions that feature the latest in biometric authentication, enabling secure biometric authentication in the office, at home, or …
Thales provides data security and identity protection capabilities through Google Workspace
Thales announced that its CipherTrust Manager and SafeNet Trusted Access have been integrated with Google Workspace Client-side encryption (beta coming soon), a new privacy …
Adrian Szwarcburg joins DigitSec as SVP of business development
Software industry veteran Adrian Szwarcburg has joined DigitSec, provider of the AppSec testing platform purpose-built for Salesforce, as senior vice president of business …
PrivaceraCloud now available in the AWS Marketplace
Privacera announced that its managed SaaS data access governance solution, PrivaceraCloud, is now available in the AWS Marketplace. PrivaceraCloud works with AWS to help …
Satori Self-Service Data Access democratizes workflows for enterprise data access requests
Satori announced Self-Service Data Access. The new capability democratizes workflows for enterprise data access requests from a three-week, IT-driven process to a five-minute, …
Security leaders more concerned about legal settlements than regulatory fines
An overwhelming 90% of security leaders are concerned about group legal settlements following a serious data breach, compared to 85% who are worried about regulatory fines, …
How to glean user insight while respecting personal privacy
While each person has a unique personality and identity, the digital world has no patience for individuality. The web tries with its every fiber to store, analyze, and …
Dealing with ransomware attacks: What options do you have?
IT decision-makers often find themselves stuck between a rock and a hard place when it comes to dealing with ransomware attacks. Do they pay a large sum of money to …
Featured news
Resources
Don't miss
- Five identity-driven shifts reshaping enterprise security in 2026
- What if your face could say “don’t record me”? Researchers think it’s possible
- Conjur: Open-source secrets management and application identity
- Counterfeit defenses built on paper have blind spots
- Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits