Enterprise security teams can use secure web browsers to apply controls and governance to cloud applications and customer data.
Read moreThycoticCentrify Renamed Delinea
February 1 2022Privileged access management vendor rebrands.
Read moreThycoticCentrify Renamed Delinea
February 1 2022Privileged access management vendor rebrands.
Read moreNucleus Security Forms Strategic Partnership with Mandiant
February 1 2022Intent is to enhance vulnerability management programs with operationalized threat intelligence.
Read moreNucleus Security Forms Strategic Partnership with Mandiant
February 1 2022Intent is to enhance vulnerability management programs with operationalized threat intelligence.
Read moreVectra Acquires Siriux Security Technologies to Extend Leadership in Identity and SaaS Threat Management
February 1 2022The acquisition positions Vectra to help customers securely configure and detect active threats in cloud identity and SaaS applications, including Microsoft Azure AD and Microsoft 365.
Read morePing Identity Launches PingOne DaVinci
February 1 2022No-code identity orchestration service enables organizations to design better user experiences with drag-and-drop simplicity.
Read moreAcquisition adds Internet of Medical Things (IoMT) expertise to Forescout’s IT, IoT, and OT coverage.
Read moreDigital Shadows Launches New Vulnerability Intelligence Module
February 1 2022New capability simplifies challenge of prioritizing CVEs for faster triage and remediation.
Read moreDisclosure, Panic, Patch: Can We Do Better?
February 1 2022Companies struggle to understand the extent to which they are affected by vulnerabilities in open source software, but security specialists and maintainers are striving to secure the ecosystem.
Read more
Recent Comments