Security News

I have been on the road for a few weeks now and surprisingly the topic of discussion has predominantly been patch management. Yes, I know I host a monthly webinar about Patch Tuesday and write...

88 percent of IT professionals acknowledge the importance of endpoint management, yet 30 percent don’t know how many they have. LogMeIn released findings of a new global report revealing current...

HackerOne announced on Wednesday the results of “Hack the DTS,” the fifth bug bounty program run by the U.S. Department of Defense (DOD). read more

The Vendor Risk Management (VRM) space has quickly become a hot topic this year. It seems like everywhere you turn, new companies offering VRM solutions are popping up. As we’ve seen with other...

Early experiments are demonstrating how blockchain, the distributed and immutable ledger behind virtual currencies, potentially could play an important role in identity management, says Avivah...



Boards of directors and management are increasingly involved in the oversight and governance of information security. The time when security was the prerogative of a technical team and the...

How do we establish and maintain digital trust without burdening our users? What are the critical questions that need to be addressed by anyone managing identity and access management in a modern...
