Security tool adoption jumps, Okta report shows
A report from identity and access management (IAM) vendor Okta says that zero trust and new types of security tooling…
A report from identity and access management (IAM) vendor Okta says that zero trust and new types of security tooling…
Machine learning (ML) is a commonly used term across nearly every sector of IT today. And while ML has frequently…
China-based cyberespionage actor DEV-0147 has been observed compromising diplomatic targets in South America, according to Microsoft’s Security Intelligence team. The…
Israel-based startup Oligo Security is exiting stealth mode with the public launch of its namesake software, offering a new wrinkle…
As business processes become more complex, companies are turning to third parties to boost their ability to provide critical services…
By David Richardson, Vice President of Product at Lookout As IT operations migrated to the cloud, it became easier to…
Descope has launched its first product, a platform designed to help developers add authentication and user management capabilities to their…
Not too long ago, guarding access to the network was the focal point of defense for security teams. Powerful firewalls…
The last year saw a rise in the sophistication and number of attacks targeting industrial infrastructure, including the discovery of…
When using any security tool, it is vitally important for it to help you to find a threat quickly. For…