Security News

Fortanix unveiled that ELASTX has deployed its Self-Defending Key Management Service (SDKMS) to protect customers’ data as they migrate to the cloud. Now ELASTX customers can utilize its platforms...

Gartner released the first-ever Magic Quadrant for Privileged Access Management*, – it is, in our view, a significant milestone for the industry. We believe it spotlights the critical importance...

Trend Micro revealed that 43 percent of surveyed organizations have been impacted by a Business Process Compromise (BPC). Despite a high incidence of these types of attacks, 50 percent of...

Developers around the world depend on open source components to build their software products. According to industry estimates, open source components account for 60-80% of the code base in modern...

Attorney Steven Teppler on Holding Vendors AccountableWhy is ramping up vendor risk management such a critical component of compliance with the EU's General Data Protection Regulation? Attorney...

Knowing the True Value of Data Assets Will Improve Cyber Security and Promote Meaningful Cyber Insurance Understanding the value of corporate assets is fundamental to cybersecurity risk...

Gemalto launched a solution that will enable organisations which have invested in Public Key Infrastructure (PKI) security applications to leverage their investment without compromise on security...

The vulnerability could allow attacker to execute arbitrary SQL queries.

Janrain released Janrain Identity Central, which allows companies to provide customer registration, authentication, single sign-on, preference and consent management, as well as self-service...

First Data's Jaclyn Blumenfeld on Practical Use Cases for Emerging TechnologiesArtificial intelligence and machine learning get all the marketing buzz, but First Data's Jaclyn Blumenfeld cites...