Security News
Ted Augustinos of Locke Lord LLP Addresses the ChallengesDefining the scope of third-party risk is challenging, says Ted Augustinos of Locke Lord LLP, who discusses compliance with the New York...
Cybersecurity performance is critical to achieving commercial success, according to a BitSight study. Among the study’s most interesting findings is that nearly two in five (38 percent) of...
As the number vulnerabilities hit a historic high, battle-worn security teams are upping their patching game.
Ryan Davis of Veracode Describes Common Mistakes, Outlines Effective StrategiesSecurity practitioners often overlook the risks of third-party resources, says Ryan Davis of Veracode, who outlines...
Chris Hallenbeck of Tanium Discusses Good Security HygieneSignificant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene...
Mark Sangster of eSentire Shares Lessons LearnedThird-party vendor risk continues to pose a security challenge to organizations. Despite many having formal policies for managing third-party risk,...
Password managers are one of the most powerful defenses against breaches, which can cause massive damage and be incredibly expensive to mitigate. According to the Ponemon Institutes’ 2019 Password...
An XML external entity (XXE) vulnerability has been found and patched in the SimpleMDM Apple device management solution, but the researcher who found the flaw and the vendor disagree on its...
San Francisco, CA-based privileged access management (PAM) solution provider Remediant has closed a $15 million Series A funding round co-led by Dell Technologies Capital and ForgePoint Capital....