Source
DARKReading
This legacy of corporations' appetite for data is not worth the risk, leaders say, emphasizing the need to find, secure and redact records
SAS and Neterium partnered to deliver Neterium’s next-gen screening capabilities on SAS’ analytics platform.
SaaS security platform promises to track down shadow IT, map supply chain risk, and "nudge" employees to work securely.
Ransomware attacks are on the rise, but organizations also have access to advanced tools and technologies they can use to fight back.
From the basics to advanced techniques, here's what you should know.
The campaign uses a combination of tactics and a common JavaScript obfuscation technique to fool both end users and email security scanners to steal credentials.
Despite dozens of tools and external vendors, 2 in 3 organizations believe their data strategy isn't sustainable beyond three years, which could leave businesses vulnerable.
New open source Cloud Hunter tool, developed through Lacework Labs research, helps customers get better visibility to reduce response times for incident investigations.
Can already beleaguered CISOs now add possible legal charges to their smorgasbord of job considerations? Disclose a breach to comply and face dismissal, or cover it up and face personal punishment.
This marks the third identity and access management (IAM) company acquired by Thoma Bravo in just the past few months.