Category: News
Vendor Access: Addressing the Security Challenge with Urgency | BeyondTrust
Vendor Access: Addressing the Security Challenge with Urgency | BeyondTrust May 11, 2020 Open You May Also Be Interested In: Our website uses cookies to provide a better user experience, […]Qualys Community Migration to Salesforce Platform
We are excited to announce that the Qualys Community discussion forums are migrating to the Salesforce platform on June 6-7 weekend. This 30-day notification explains why we are changing the […]Just-in-Time (JIT) Access Series Part 3: Zero Standing Privileges
Welcome back to the conclusion of our three-part series on Just-in-Time (JIT) access. In part 1 we discussed what Just-in-Time access is and where it fits in to our Privileged […]Announcing the Integration of Atera’s Powerful PSA and RMM Suite for MSPs with Acronis Cyber Cloud
Managed service providers (MSPs) are busier than ever. They’re responsible for managing and protecting an ever-growing amount of data, applications, and systems for their clients in locations that span the […]Checkmarx Named a 2020 Gartner Magic Quadrant Leader for Application Security Testing
NEW YORK & RAMAT GAN, ISRAEL – May 1, 2020 – Checkmarx, the global leader in software security solutions for DevOps, today announced that it has been recognized as a […]Ivanti Interchange Virtual World Tour: Dates and Details
As you’ve probably heard, this year’s in-person Interchange conference has been canceled. But we’re not the type to leave you hanging. We’ve taken all the best parts of our annual user […]Michael Engel (Diebold-Nixdorf) – Encrypting Retail Banking Services for End-to-End Security (video)
For more information from Utimaco Blog, visit https://www.utimaco.com/Mirror Mirror On The Wall, Is My Cloud The Most Secure?
What is the value of your cloud security investment? How does your cloud security measure up with industry peers? Amongst all the cloud security measures available, where should you get […]Why Bother with Risk Assessment?
IT risk assessment is the process of identifying security risks and assessing the threat they pose. The ultimate purpose of IT risk assessment is to mitigate risks to prevent security […]Attention CISOs: Get Answers to Your Top Questions
Attention CISOs: Get Answers to Your Top Questions POSTED BY LIZ BUSH At the helm of their security organization and often in the “hot seat”, CISOs can feel alone as […]Load More