Trained developers get rid of more vulnerabilities than code scanning tools
An EMA survey of 129 software development professionals uncovered that for those using code scanning tools, only 10% of organizations prevented a higher percentage of …
How companies are prioritizing infosec and compliance
New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for …
DuploCloud unveils a unified platform for DevOps automation and compliance
DuploCloud unveiled a new version of its unified cloud DevOps and compliance platform. New advancements include compliance standards HITRUST and NIST, as well as SOC 2, PCI, …
Obstacles and threats organizations face when protecting AD
Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the …
Stacklet Platform delivers frictionless governance that accelerates cloud adoption in large-scale environments
Stacklet announced Stacklet Platform, which allows cloud engineering and security teams to easily understand, codify, and automate cloud governance for a frictionless …
Passwords still dominant authentication method, top cause of data breaches
Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. A new report also highlighted the importance of a zero trust …
How important is packet capture for cyber defense?
Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of …
Deception technology shifts power back to the defender
Users of deception technology reported a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network when compared to …
Most organizations plan to adopt new authentication solutions within two years
Enabling mobile device authentication with biometric-based access is the best approach to eliminate passwords, according to MobileIron. Percentage of respondents identifying …
Featured news
Sponsored
Don't miss
- Millions of Synology NAS devices vulnerable to zero-click attacks (CVE-2024-10443)
- Hiring guide: Key skills for cybersecurity researchers
- Whispr: Open-source multi-vault secret injection tool
- Cybersecurity in crisis: Are we ready for what’s coming?
- How open-source MDM solutions simplify cross-platform device management