Security News

Code Keepers: Mastering Non-Human Identity Management
2024-04-12 11:13

Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and...

Graylog: Open-source log management
2024-04-11 04:00

Please turn on your JavaScript for this page to function normally. Graylog is an open-source solution with centralized log management capabilities.

Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity Cloud PAM Essentials
2024-04-09 05:30

As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access Management (PAM) solution can't be overstated....

How exposure management elevates cyber resilience
2024-04-09 04:43

Understanding an attacker's viewpoint is crucial for pinpointing vulnerabilities, informing security teams where to apply security measures first and what additional security controls are necessary. Without seeing how an attacker can infiltrate the organization, securing an organization becomes a hypothetical task.

Strategies for secure identity management in hybrid environments
2024-04-09 04:00

In this Help Net Security interview, Charlotte Wylie, SVP and Deputy CSO at Okta, discusses the challenges of managing user identities across hybrid IT environments. Wylie also highlights strategies for combating password fatigue, integrating IAM solutions, securing operational technology, and establishing identity security policies.

Attack Surface Management vs. Vulnerability Management
2024-04-03 11:12

Attack surface management (ASM) and vulnerability management (VM) are often confused, and while they overlap, they’re not the same. The main difference between attack surface management and...

Risk Management Policy
2024-03-18 16:00

Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost data. The process of establishing appropriate risk management guidelines is critical to ensure company operations and reputation do not suffer adverse impacts.

8 Best Identity and Access Management (IAM) Solutions in 2024
2024-03-13 19:33

With remote work becoming so commonplace, identity and access management software has grown in importance in recent years. Roid Enterprise Mobility Management enables secure selection, deployment and management of Android devices and services.

Fortinet warns of critical RCE bug in endpoint management software
2024-03-13 18:48

Fortinet patched a critical vulnerability in its FortiClient Enterprise Management Server software that can allow attackers to gain remote code execution on vulnerable servers. Last month, Fortinet disclosed a critical remote code execution bug in the FortiOS operating system and the FortiProxy secure web proxy, which the company tagged as "Potentially being exploited in the wild."

CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management
2024-03-12 11:07

In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you’d want to do. But if you are looking for ways to continuously...