Now-patched issue in Essential Addons for Elementor gives attackers a way to carry out local file inclusion attacks, researchers say.
Read moreEnterprise security teams can use secure web browsers to apply controls and governance to cloud applications and customer data.
Read moreEnterprise security teams can use secure web browsers to apply controls and governance to cloud applications and customer data.
Read moreThycoticCentrify Renamed Delinea
February 1 2022Privileged access management vendor rebrands.
Read moreThycoticCentrify Renamed Delinea
February 1 2022Privileged access management vendor rebrands.
Read moreNucleus Security Forms Strategic Partnership with Mandiant
February 1 2022Intent is to enhance vulnerability management programs with operationalized threat intelligence.
Read moreNucleus Security Forms Strategic Partnership with Mandiant
February 1 2022Intent is to enhance vulnerability management programs with operationalized threat intelligence.
Read moreVectra Acquires Siriux Security Technologies to Extend Leadership in Identity and SaaS Threat Management
February 1 2022The acquisition positions Vectra to help customers securely configure and detect active threats in cloud identity and SaaS applications, including Microsoft Azure AD and Microsoft 365.
Read moreAcquisition adds Internet of Medical Things (IoMT) expertise to Forescout’s IT, IoT, and OT coverage.
Read morePing Identity Launches PingOne DaVinci
February 1 2022No-code identity orchestration service enables organizations to design better user experiences with drag-and-drop simplicity.
Read more
Recent Comments