Lacework integrates Kubernetes features to improve security in multi-cloud environments

Polygraph Data Platform adds Kubernetes audit log monitoring, Kubernetes Admission Controller integration, and Infrastructure-as-Code (IaC) security to help integrate security seamlessly into developer workflows SAN JOSE, Calif., May 18, 2022 /PRNewswire/ — lace®, the data-driven cloud security company, today announced new features added to the Polygraph® data platform that provide enhanced visibility and protection across … Read more

Indusface enhances its Web Application and API Protection (WAAP) platform AppTrana with the industry’s first risk-based protection for APIs

Indusface enhances its Web Application and API Protection (WAAP) platform AppTrana with the industry’s first risk-based protection for APIs

Bengaluru, India, May 18, 2022 /PRNewswire/ — Indusface, a leading application security SaaS company that continuously detects security risks, provides real-time protection, and improves website and application performance, today announced that it will add risk-based API protection to its WAAP platform, AppTrana. APIs are the lifeblood of the digital economy with many companies adopting the … Read more

Introducing IDQL and Hexa: A New Identity Standard for Policy Orchestration

Introducing IDQL and Hexa: A New Identity Standard for Policy Orchestration

What is especially valuable about IDQL/Hexa is that it coordinates a consistent policy across all cloud platforms and technology stack. This vendor-agnostic, open-source approach is necessary to accelerate adoption among vendors, developers, and business users alike.– Jack Poller, Senior Analyst, Enterprise Strategy Group (ESG) Cloud Computing offers many benefits — agility, scalability, efficiency, and speed, … Read more

When your smart ID card reader comes with malware – Krebs on Security

When your smart ID card reader comes with malware – Krebs on Security

Millions of U.S. government employees and contractors have been issued a secure smart ID card that allows physical access to controlled buildings and spaces, and provides access to government computer systems and networks with the security level suitable for card holder. But many government employees aren’t provided with an approved card reader device that allows … Read more

Why scalability is a must for internal risk management

Why scalability is a must for internal risk management

This is the third post in our blog series on Insider Threat Monitoring Tools vs. Insider Risk Management Tools. Read previous posts here. Scalability Y Total cost of ownership they are critical factors in almost all enterprise IT operations, including security. In today’s dynamic environment, organizations need solutions that reduce the demand for insufficient security … Read more

Rapid7 Named a Visionary for the Second Consecutive Year in the Gartner® Magic Quadrant™ for Application Security Testing

Rapid7 Named a Visionary for the Second Consecutive Year in the Gartner® Magic Quadrant™ for Application Security Testing

BOSTON, April 21, 2022 (GLOBE NEWSWIRE) — Rapid7, Inc.. RPDa leading security automation and analytics provider, today announced that it has been recognized as a Visionary by Gartner for the second consecutive year in the 2022 Magic Quadrant for Application Security Testing. Modern application security is becoming more complex and challenging due to remote and … Read more

PASA Bolsters Cyber ​​Attack Management Checklist Amid Rising Crime – Law & Regulation

PASA Bolsters Cyber ​​Attack Management Checklist Amid Rising Crime – Law & Regulation

The trade body builds on its November 2020 checklist by providing specific examples of what administrators can do. Shows examples of how to increase resiliency to meet legal and regulatory standards, understand the vulnerability of the organization, and ensure it is resilient while still being able to fulfill key functions. The list comes after a … Read more

Cybersecurity Statistics: 7 Crazy Facts

Cybersecurity Statistics: 7 Crazy Facts

Cybersecurity is intriguing, not only because of its mind-blowing technological aspects, but also because of the importance it has on online organizations. This aspect is not easily seen, especially if you don’t care much about cyber security statistics. Well, that’s exactly why we created a list of 7 crazy cybersecurity statistics! #1- Cloud usage is … Read more