Please turn on your JavaScript for this page to function normally.
Yor
Open-source tool Yor automatically tags IaC resources for traceability and auditability

Yor is an open-source tool from Palo Alto Networks that automatically tags cloud resources within infrastructure as code (IaC) frameworks such as Terraform, Cloudformation, …

SASE
Adding complexity through simplification: Breaking down SASE

In an industry that’s not short of jargon and buzzwords, cybersecurity has a new acronym to reckon with: SASE, or secure access service edge. Introduced by Gartner in 2019 and …

1Kosmos Passwordless Identity Package provides a scalable passwordless authentication solution

1Kosmos announced the availability of its Passwordless Identity Package (PIP). The 1Kosmos PIP provides enterprises a risk-free, scalable passwordless authentication solution. …

Adaptiva adds new capabilities and health checks to its Endpoint Health product

Adaptiva announced the release of a new version of Endpoint Health, the fastest, most scalable solution to assess and remediate endpoint health. With this launch, Adaptiva not …

user
Four proactive steps to make identity governance a business priority

Securing digital identities is crucial to business success today, but far too often, it’s an afterthought. As such, identity governance shouldn’t be celebrated as a singular …

Imperva introduces Serverless Protection to secure serverless computing functions

Imperva launches Imperva Serverless Protection, a new product built to secure organizations from vulnerabilities created by misconfigured apps and code-level security risks in …

Juniper Networks Apstra 4.0 enhances the experience of users and operators in the data center

Juniper Networks announced version 4.0 of Apstra software, the intent-based networking solution acquired earlier in the year. Juniper Apstra helps organizations to minimize …

Ermetic partners with IDSA to address risks associated with over privileged cloud identities

Ermetic announced it will work with the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral education and resources to help organizations …

code
A leadership guide for mitigating security risks with low code platforms

The low code market continues to grow, increasingly finding adoption for more diverse and serious applications among enterprises and independent software vendors (ISVs). The …

zero trust
Can zero trust kill our need to talk about locations?

As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise …

ServiceNow delivers new security integrations with Microsoft to automate security workflows

ServiceNow announced new strategic Security Operations-focused integrations with Microsoft, extending the two companies existing partnership. The announcement was made at …

Arctic Wolf Managed Security Awareness prepares employees to neutralize attacks

Arctic Wolf launched Arctic Wolf Managed Security Awareness, a radical new approach to security and awareness training that helps organizations build cyber resilience against …

Don't miss

Cybersecurity news