Please turn on your JavaScript for this page to function normally.
code
Trained developers get rid of more vulnerabilities than code scanning tools

An EMA survey of 129 software development professionals uncovered that for those using code scanning tools, only 10% of organizations prevented a higher percentage of …

idea
How companies are prioritizing infosec and compliance

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for …

Software
DuploCloud unveils a unified platform for DevOps automation and compliance

DuploCloud unveiled a new version of its unified cloud DevOps and compliance platform. New advancements include compliance standards HITRUST and NIST, as well as SOC 2, PCI, …

Active Directory
Obstacles and threats organizations face when protecting AD

Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the …

Stacklet Platform delivers frictionless governance that accelerates cloud adoption in large-scale environments

Stacklet announced Stacklet Platform, which allows cloud engineering and security teams to easily understand, codify, and automate cloud governance for a frictionless …

password
Passwords still dominant authentication method, top cause of data breaches

Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. A new report also highlighted the importance of a zero trust …

connection
How important is packet capture for cyber defense?

Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of …

eye
Deception technology shifts power back to the defender

Users of deception technology reported a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network when compared to …

iPhone
Most organizations plan to adopt new authentication solutions within two years

Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …

Don't miss

Cybersecurity news