Security Technology & Operations

Global Security Information and Event Management Market Size Is Expected to Reach $6 Billion by 2026

KBV Research released its Global Security Information and Event Management (SIEM) Market Forecast report last month. In light of the recent COVID-19 pandemic, the SIEM...

Two New Zoom Vulnerabilities Uncovered – Upgrade Now!

Two new vulnerabilities in Zoom’s web conferencing software were discovered in early June 2020. The vulnerabilities could allow malicious actors the ability to execute...

Azure Sentinel: What is it, What are the Four Key Security Fundamentals, and Why You Should Know About It

Microsoft’s cloud Security Incident Event Management (SIEM) solution leverages modern day enhancements such as Security Orchestration Automated Response (SOAR), Machine...

“Unsafe” Code Uncovered in Chrome Browser (and Chromium-Based Browsers)

Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all...

Rapid7 – Key Reasons Around Cloud-Native SIEM

In today’s world many security teams require a simplified holistic method to consolidate disparate log data, threat anomalies, and responses. Due to these pressured...

Transactional Email Service Gives Retarus a Leg Up on the Competition

Retarus, a managed service cloud-based email security platform, is a growing company to watch out for. Since its initiation in 1992, it has quickly expanded its services...

CallStranger Vulnerability Affects Billions of IoT Devices

A vulnerability named CallStranger has been discovered, which exploits the Universal Plug-and-Play (UPNP) protocol used by billions of internet-connected devices. These...

Privileged Access Management (PAM) Misconceptions: Starting the Journey

During the first three months of the COVID-19 pandemic, many organizations realized the true value of IT and the role it played in ensuring ongoing business operations....

Bomgar & BMC Team Up to Speed Trouble-Ticket Resolution

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have...

Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us