Security News

The Shared Assessments Program, the member-driven leader in third party risk assurance, issued the 2020 Shared Assessments Third Party Risk Management Toolkit to help enable organizations around...

Delta Risk, a leading provider of SOC-as-a-Service and security services, announced that it has partnered with The Crypsis Group, a leading incident response, risk management, and digital...

Fortanix, the Runtime Encryption company, announced that it has collaborated with Google Cloud Platform (GCP) to integrate its newly announced External Key Manager service with the Fortanix...

xMatters, a digital service availability platform that prevents IT issues from becoming business problems, announced product advancements that strengthen an enterprise’s ability to deliver...

HITRUST, a leading data protection standards development and certification organization, announced a major release of its HITRUST Third-Party Risk Management (“TPRM”) Methodology that introduces...

The Chertoff Group and Dragos announced the formation of a unique alliance that will provide a holistic approach to cybersecurity risk management for industrial organizations seeking to protect...

IGEL Universal Management Suite 6.03 offers faster, more secure and flexible management of endpoints
IGEL, provider of the next-gen edge OS for cloud workspaces, announced the release of IGEL Universal Management Suite (UMS) 6.03. Purpose-built to simplify the complexity of enterprise...

Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or...

Data breaches are at an all-time high with 2019 looking to one of the worst on record for data loses. Within the data security battle, encryption is considered to be the gold standard that...

Adaptiva, a leading, global provider of endpoint management and security solutions for enterprise customers, announced that it will release Evolve VM. This groundbreaking, complete vulnerability...