Security News

Survey: Finance Execs Asked To Play Bigger Role in Defending Against Cyber Threats

CFOs and other top finance execs are being asked to play a bigger role in defending their firms against growing cyber threats, according to a recent a survey. As a result, IT may expect in 2016 to get more help in fighting cybercrime from the business side. 

Full Story >

Survey: Ping Identity Finds Employee Behaviors Can Be Big Contributors To Security Risks

A recent survey of 1,000 employees at large U.S. enterprise organizations finds that employee inattentiveness, laziness and possible malicious intent add up to constitute a real cyber security concerns.  The research was commissioned by security vendor Ping Identity.

Full Story >

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

LogRhythm Extends Threat Analytics Suite with Endpoint Module

Security intelligence firm LogRhythm is looking to help IT more quickly detect intruders with its latest offering Endpoint Threat Analytics Module. It supplements LogRythm’s current threat analytics modules for network and end user visibility.

Full Story >

SailPoint Extends IAM To Govern Unstructured Data with Acquisition of Whitebox Security

SailPoint, a long-time identity and access management provider, is beefing up its ability to protect unstructured data with its acquisition of Whitebox Security and the WhiteOPS unstructured data governance solution.

Full Story >

Ping’s ‘Identity Defined Security’ Initiative Aims To Protect Mobile, APIs and IoT Projects

Ping Identity is delivering on its position that identity will be the best way to deliver security to the growing wave of extended enterprise use cases, including mobile, cloud and event IoT. IDN reviews components of Ping’s ‘Identity Defined Security’ initiative.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Dell Software's InTrust 11.0 Taps Vast Data Volumes To Delivers Real-Time Security, Alerts

Dell Software’s latest update to its InTrust analytics tool mines huge data volumes to help security teams stave off security threats and quickly discover suspicious trends and anomalies. IDN looks at InTrust 11.0 features.

Full Story >

Survey: Some Employees at Global Firms Would Sell Passwords for $150

Enterprise security professionals worried their systems and data could be vulnerable to “inside hacks,” have another good reason for concern.  A survey of 1,000 employees at large global organizations found one-in-seven admit they would sell passwords to outsiders for little as $150. IDN explores the Market Pulse Survey from SailPoint.

Full Story >

ForgeRock’s Latest IRM Platform Gets Updates for Multi-Channel, Self-Service, Quick Configuration

ForgeRock Inc., a provider of open-platform identity relationship management (IRM) solutions is shipping a fully updated ForgeRock Identity Platform with a new version of its components for access management, identity management and identity gateway.

Full Story >

ManageEngine’s ADSelfService Plus Delivers Wide Range of Self-Service Password Management

TT management company ManageEngine has updated its self-service password management solution, ADSelfService Plus, to help IT admins ensure that Windows password changes are synced with associated IT systems and applications. The result is a wide range of end user-friendly password management features.

Full Story >

Showing 13 - 24 of 122