Security News

Mark Sangster of eSentire Shares Lessons LearnedThird-party vendor risk continues to pose a security challenge to organizations. Despite many having formal policies for managing third-party risk,...

Password managers are one of the most powerful defenses against breaches, which can cause massive damage and be incredibly expensive to mitigate. According to the Ponemon Institutes’ 2019 Password...

An XML external entity (XXE) vulnerability has been found and patched in the SimpleMDM Apple device management solution, but the researcher who found the flaw and the vendor disagree on its...

San Francisco, CA-based privileged access management (PAM) solution provider Remediant has closed a $15 million Series A funding round co-led by Dell Technologies Capital and ForgePoint Capital....

Limelight Networks has expanded the management and configuration capabilities of its suite of services with new Application Programming Interfaces (APIs) and web portal offerings. With these new...

In this Help Net Security podcast recorded at Black Hat USA 2019, Hari Srinivasan, Director of Product Management for Qualys, talks about the basics of securing your cloud. Here’s a transcript of...

Among organizations that engage third parties to provide business services, 83% identified third-party risks after conducting due diligence and before recertification, according to Gartner....

Greenbone, a leading provider of vulnerability analysis for IT networks, announced that its portfolio of vulnerability management (VM) products is now available via virtual appliances. Greenbone’s...

Helping financial services organizations keep up with a changing market landscape, NICE Actimize announced that Jumio, a global leader in AI-powered identity verification, has joined the X-Sight...

Baruch Thee of Tufin Shares RecommendationsOrganizations need to move away from manual processes and take an automated approach to policy change management, says Baruch Thee of Tufin.