Using Salesforce? Here are 5 security and compliance considerations
When it comes to mission-critical cloud applications, today’s security teams have a laundry list of different focus areas. From ensuring cloud providers deliver adequate …
Most organizations have already migrated to a cloud VPN
The majority of organizations have already migrated their VPN solution to the cloud, a NetMotion survey reveals. A study surveyed 750 leaders working in IT, security and …
Cloud-native watering hole attack: Simple and potentially devastating
In this era of increasing technological complexity, watering hole attacks build on a model of simplicity. Just like predatory animals that hover near sources of water favored …
Not all eSignature solutions are necessarily right for business
The popularity of eSignature solutions has skyrocketed in the last year, as part of companies’ digital transformation efforts in the COVID-19 environment. However, not all …
58% of IT and security pros concerned about security in the cloud
The Cloud Security Alliance and AlgoSec published research which queried nearly 1,900 IT and security professionals from a variety of organization sizes and locations, sought …
VMware patches critical vRealize Operations flaws that could lead to RCE
Two vulnerabilities (CVE-2021-21975, CVE-2021-21983) recently patched by VMware in its vRealize Operations platform can be chained together to achieve unauthenticated remote …
Cloud technology adoption gap between internal audit and other enterprise functions to narrow
Internal audit’s ongoing digital transformation will rapidly accelerate in 2021, with 22% of respondents reporting that they will implement cloud-based technology this year, …
3 steps to meeting data privacy regulation compliance through identity programs
Cybersecurity is undeniably a business-critical function. That’s only been reinforced over the past few months by the SolarWinds and Exchange attacks. Consequently, a recent …
Hybrid IAM: Addressing the security and experience issues caused by hybrid IT
More than 80% of global IT decision-makers have already adopted, or plan to adopt or expand, cloud-based identity and access management (IAM) initiatives over the next two …
The importance of a zero trust-based approach to identity security
97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials, a CyberArk survey reveals. As organizations move …
Why DDI technology is fundamental for multicloud success
Whether they are handling new applications or managing workloads, cloud and multicloud technologies are critical components of the modern workplace. But the real value of …
80% of security leaders would like more control over their API security
There are major gaps in API security based on insights from over 100 senior security leaders at large enterprises in the United States and Europe, an Imvision report reveals. …