SolarWinds
SolarWinds Database Mapper and Task Factory enable data professionals to accelerate cloud migrations
SolarWinds introduced SolarWinds Database Mapper and SolarWinds Task Factory as part of its comprehensive database management portfolio, strengthening the company’s offering …
List of IT assets an attacker is most likely to target for exploitation
Randori released a report that identifies the most tempting IT assets that an attacker is likely to target and exploit. Leading up to the anniversary of the Solarwinds hack, …
How collaboration between IT pros and senior leaders could drive the future of risk mitigation
What is an acceptable level of risk for IT pros and their organizations? The answer to this question has changed in recent years, with the threat landscape shifting …
Semperis Directory Services Protector 3.6 monitors for cyber threats in hybrid AD environments
Semperis announced the preview release of Directory Services Protector 3.6, which simplifies managing identity security in hybrid environments that use both on-premises Active …
A multi-party data breach creates 26x the financial damage of single-party breach
Cyentia Institute and RiskRecon released a research that quantifies how a multi-party data breach impacts many organizations in today’s interconnected digital world. The study …
Jscrambler raises $15M to augment marketing and sales resources in the U.S. and European markets
Jscrambler announced it has raised $15 million in Series A financing for website and mobile app security to rewrite the rules of website security. The round was led by Ace …
Stairwell Inception helps organizations get ahead of the most sophisticated attackers
Stairwell launched Inception, a platform for recursive threat hunting, detection, and response. Inception helps security practitioners decisively and quickly determine if they …
Tech pros reporting a positive perception of their roles, looking forward to what lies ahead
Amidst ongoing pandemic-driven change at work and at home, a SolarWinds survey seeks to understand how tech pros feel about their daily roles and responsibilities, the lessons …
Beyond Identity’s solution secures the software supply chain against insider threats and malicious attacks
Beyond Identity announced a solution that closes a critical vulnerability and secures the software supply chain against insider threats and malicious attacks. Beyond …
Execs concerned about software supply chain security, but not taking action
Venafi announced survey results highlighting the challenges of improving software supply chain security. The survey evaluated the opinions of more than 1,000 IT and …
Titania’s module automates the audit process for mission critical CMMC security practices
Titania launched new tool to automate checks of core network security practices of the defense industrial base to meet the specifications set by the Department of Defense …
Protecting your company from fourth-party risk
In a world that is becoming ever more interconnected, organizations are learning firsthand that they are not only vulnerable to the adverse events that their vendors …