Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.
|
|
Announced on December 31, 2019, BeyondTrust named Tenable as the successor to its Vulnerability Management suite.
|
|
On January 15, 2020, the Department of Defense (DoD) issued an open call to vendors to fulfill a contract to help improve their technology and inventory management.
|
|
On January 14, Microsoft issued a statement acknowledging a crucial security flaw within its Windows 10 operating systems: a failure in the Windows 10 CryptoAPI service...
|
|
A newly announced collaboration between CipherCloud and Thales promises to enable zero trust access control for data in the cloud. This may be a compelling value...
|
|
Avatier, an IAM vendor, has developed an innovative solution for automating mundane IAM tasks: a chatbot called Apollo. Apollo is a great example of how ANI can enable...
|
|
Palo Alto Networks has acquired Aporeto, a machine-identity-based microsegmentation company, for $150 million. As Palo Alto seeks to solidify itself as a cloud-centric...
|
|
Dark web monitoring for supply chain risk is becoming a mandatory feature for cyber risk ratings providers. Panorays’ latest press release shows that it is catching up to...
|
|
Use this deck to learn what projects security practitioners are prioritizing for 2020.
|
|
Use this deck to understand what projects security practitioners are prioritizing for 2020.
|
|