Please turn on your JavaScript for this page to function normally.
security platform
Delinea DevOps Secrets Vault updates strengthen security for coded credentials

Delinea announced the newest release of DevOps Secrets Vault, its high-speed vault for DevOps and DevSecOps teams. The latest features include Bring Your Own Key (BYOK), …

security platform
Delinea Privilege Manager enhancements reduce risk of cyber attacks through workstations

Delinea announced new features for Privilege Manager, its solution for managing privileged access on Windows and Mac workstations. Updates in this release include improvements …

New infosec products of the week: December 2, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, Datadog, Delinea, Fortinet, LogicGate, Shoreline, and Trend Micro. …

security platform
Delinea unveils granular privilege elevation workflow for on-premise and cloud servers

Delinea announced the latest release of Cloud Suite, its solution that controls privileged access and authorization for on-premise and cloud servers. A new granular privilege …

Video lock
Delinea DevOps Secrets Vault enhancements reduce the risk of compromised credentials

Delinea announced the latest release of DevOps Secrets Vault, its high-speed vault for DevOps and DevSecOps teams. New enhancements include development support on the most …

Report: Benchmarking security gaps and privileged access
Report: Benchmarking security gaps and privileged access

Delinea set out to understand what IT security leaders are doing to reduce the risk of a privileged account or identity-based attack. This report reveals how people close to …

gap
How Just-in-Time privilege elevation prevents data breaches and lateral movement

Are inadequate security policies for privileged access making you highly vulnerable to security breaches and ransomware attacks? In the weeks that followed the high-profile …

Black Hat USA 2022
Photos: Black Hat USA 2022

Here’s a photo gallery that provides a look inside Black Hat USA 2022. For our complete coverage of the conference, live from Las Vegas, check out our microsite. Bayside …

account
Stolen credentials are the most common attack vector companies face

60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), …

Privileged Access Management for Dummies
eBook: Privileged Access Management for Dummies

With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it’s time all cybersecurity stakeholders got educated. This …

face
84% of organizations experienced an identity-related breach in the past 18 months

60% of IT security decision makers believe their overall security strategy does not keep pace with the threat landscape, and that they are either lagging behind (20%), …

PAM solution
Benefits of modern PAM: Efficiency, security, compliance

Many legacy Privileged Access Management (PAM) solutions are still very manual regarding what they do and how they manage user access and permissions. They are geared toward …

Don't miss

Cybersecurity news