Orchestration Tool Makers Set Sights on Security and Compliance

Orchestration tool makers have set their sights on security and compliance. IT professionals should remember that “compliance as code” isn’t the easy button they might...

KnowBe4 Begins the Federal Risk and Authorization Management Program (FedRAMP) Authorization Process

KnowBe4, a leader in end-user security training, has begun the authorization process for the Federal Risk and Authorization Management Program (FedRAMP). This is yet...

OneTrust Launches Vendorpedia, a Combined Security and Privacy Third-Party Risk Exchange

At the 2019 RSA Conference, OneTrust announced Vendorpedia, billed as the only security and privacy third-party risk exchange. However, it will need to increase its...

CrowdStrike Introduces CrowdStrike Store to Third-Party Applications

Falcon clients have the opportunity to optimize their security stack through pre-built and trusted third-party applications. This significantly alleviates the...

“It’s basically AES-256 encryption on steroids”: SecurityFirst Enthusiastic About DataKeep 2.3

Do you like the security encryption provides? Are you running an NFS or AIX system? If you said yes, you may be interested in recent updates to SecurityFirst’s signature...

RiskRecon and RSA Announce Partnership to Bring Cyber Risk Ratings to Archer GRC Customers

​RiskRecon and RSA have announced a partnership to bring RiskRecon’s third-party risk rating services to RSA’s Archer Governance, Risk and Compliance (GRC) system. This...

Security Lessons From Recent Citrix Data Breach

According to Citrix and Resecurity, attackers exploited weak passwords and bypassed multi-factor authentication to obtain Citrix’s business documents.

BitSight Announces New Cyber Risk Score Benchmarking Service

BitSight, one of the leaders in cyber risk rating, has announced a new product to allow organizations to benchmark against their peers. Dubbed “Peer Analytics,” this...

Embed Security Into the DevOps Pipeline

Transcend traditional application security approaches and embrace the agile mindset to shift security left. Use innovation and automation to secure the DevOps pipeline...
  • guided implementation icon

Embed Security Into the DevOps Pipeline – Executive Brief

Read this Executive Brief to understand DevOps and how to secure the development pipeline.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us