Security News


An effective third-party risk management program starts with asking the right questions, says Brad Keller, chief strategy officer and senior vice president at the Santa Fe Group, a strategic...

Zyxel Communications, a leading provider of secure broadband networking, Internet access and connected home products, announced the addition of new key management features and six new...

Too many organizations around the world take a "bare minimum" approach to third-party risk management, says Jonathan Ehret, founder of the Third Party Risk Association, who offers risk mitigation insights.

Crownpeak, a global leader in privacy and digital governance management, announced a new extension for “Launch”, Adobe’s Cloud Platform tag-management facility, to help marketers simplify...

Security teams' jobs continue to get exceedingly difficult, but they're still spending time trying to figure out where things are and what they are.Security teams' jobs continue to get exceedingly...

AlgoSec's Jeffrey Starr Says IT Environments Ever More Heterogeneous and ComplexVisibility, or a lack thereof, continues to challenge organizations as they attempt to protect their businesses by...

The Shared Assessments Program, the member-driven leader in third party risk assurance, announced a new Third Party Risk Management (TPRM) Framework designed to help organizations of all sizes...

HID Global, a worldwide leader in trusted identity solutions, announced it has added the HID Credential Management Service to its growing offering of cloud-based identity solutions. The service...

Multiple cross-site scripting (XSS) bugs and an XML external entity (XXE) problem opens the door to takeover of admin desktops.