The State of Machine Identity Management report from Keyfactor examined the role of public key infrastructure (PKI) and machine identities in securing modern enterprises.
Unauthorized enterprise Software as a Service (SaaS) applications can present cybersecurity risks to a business. Gaining visibility into SaaS apps is key.
Rob Thompson has been named as Wayne State University’s Chief Information Officer (CIO) and Associate Vice President for Computing and Information Technology (C&IT).
The Global Study on Zero Trust Security for the Cloud from Appgate and conducted by the Ponemon Institute surveyed security professionals to examine cloud security and zero trust practices.
International electric and manufacturing firm Schneider Electric uses a Systems Applications and Products (SAP) security platform from SecurityBridge to bolster SAP visibility. Learn more in this case study.
Now more than ever, it’s important to instill trust in the software supply chain. Code signing can help organizations ensure the security of their software supply chain.
Ian Wallace has been named Senior Advisor for Strategy at the Cybersecurity and Infrastructure Security Agency (CISA)'s Office of Strategy, Policy & Plans.
Despite the appeal of stories that pitch artificial intelligence (AI) cyberattacks versus AI cyber defense, the reality is that humans are still at the heart of any complicated cyberattack and cybersecurity efforts.
The shift to hybrid and remote work rapidly increased enterprise attack surfaces. According to a survey from Oomnitza, 60% of cybersecurity leaders have low levels of confidence in their attack surface risk management.