News

According to The Wall Street Journal, Palo Alto Networks is in advanced talks to acquire identity security leader CyberArk for more than $20 billion—potentially the largest deal in the company’s ...
The security breach of the popular women-only safe-dating app Tea widened over the weekend, when a second database storing 1.1 million DMs between members was compromised. News of the exposure came ...
For years, primarily driven by regulatory compliance mandates, such as the Sarbanes-Oxley Act of 2002, identity and access management has been treated as Identity Risk Isn’t Just a Compliance Issue—It ...
For decades, network security followed a simple model: the castle and moat design philosophy. We built strong perimeters with firewalls and relied on Traditional network access control (NAC) is no ...
Clorox is suing Cognizant for $380 million, saying the IT services provider's service desk put in place to protect the ...
Christina Marie Chapman, an Arizona resident, was sentenced to 8.5 years in prison for her role in a wide-ranging North ...
A new ransomware variant dubbed "Crux" was detected by Huntress researchers in three attacks this month, with the group ...
Intruder’s new open-source API testing tool makes it easier for security teams to identify vulnerabilities before attackers ...
Security vulnerability on U.S. trains … known for 13 years “Anyone with an SDR could mimic these packets” A security ...
A statute that requires identity verification to read news articles or shop for groceries would be problematic; one that does ...
Threat actors are using anti-box tools, AI, and cloaking-as-a-service tactics to bypass security tools by showing a phishing ...
Alan Shimel is the founder and editor-in-chief of Techstrong Group. He’s been in the trenches of cybersecurity, DevOps, and digital transformation for more than two decades — and has the scars (and ...