Open-source tool Yor automatically tags IaC resources for traceability and auditability
Yor is an open-source tool from Palo Alto Networks that automatically tags cloud resources within infrastructure as code (IaC) frameworks such as Terraform, Cloudformation, …
Adding complexity through simplification: Breaking down SASE
In an industry that’s not short of jargon and buzzwords, cybersecurity has a new acronym to reckon with: SASE, or secure access service edge. Introduced by Gartner in 2019 and …
1Kosmos Passwordless Identity Package provides a scalable passwordless authentication solution
1Kosmos announced the availability of its Passwordless Identity Package (PIP). The 1Kosmos PIP provides enterprises a risk-free, scalable passwordless authentication solution. …
Adaptiva adds new capabilities and health checks to its Endpoint Health product
Adaptiva announced the release of a new version of Endpoint Health, the fastest, most scalable solution to assess and remediate endpoint health. With this launch, Adaptiva not …
Four proactive steps to make identity governance a business priority
Securing digital identities is crucial to business success today, but far too often, it’s an afterthought. As such, identity governance shouldn’t be celebrated as a singular …
Imperva introduces Serverless Protection to secure serverless computing functions
Imperva launches Imperva Serverless Protection, a new product built to secure organizations from vulnerabilities created by misconfigured apps and code-level security risks in …
Juniper Networks Apstra 4.0 enhances the experience of users and operators in the data center
Juniper Networks announced version 4.0 of Apstra software, the intent-based networking solution acquired earlier in the year. Juniper Apstra helps organizations to minimize …
Ermetic partners with IDSA to address risks associated with over privileged cloud identities
Ermetic announced it will work with the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral education and resources to help organizations …
A leadership guide for mitigating security risks with low code platforms
The low code market continues to grow, increasingly finding adoption for more diverse and serious applications among enterprises and independent software vendors (ISVs). The …
Can zero trust kill our need to talk about locations?
As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise …
ServiceNow delivers new security integrations with Microsoft to automate security workflows
ServiceNow announced new strategic Security Operations-focused integrations with Microsoft, extending the two companies existing partnership. The announcement was made at …
Arctic Wolf Managed Security Awareness prepares employees to neutralize attacks
Arctic Wolf launched Arctic Wolf Managed Security Awareness, a radical new approach to security and awareness training that helps organizations build cyber resilience against …
Featured news
Sponsored
Don't miss
- Microsoft confirms second 0-day exploited by Void Banshee APT (CVE-2024-43461)
- EchoStrike: Generate undetectable reverse shells, perform process injection
- Compliance frameworks and GenAI: The Wild West of security standards
- The ripple effects of regulatory actions on CISO reporting
- eBook: Navigating compliance with a security-first approach