WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
eweek | October 15, 2018
CyberArk has integrated technology from Vaultive to create a new offering that looks to help organizations secure session and access management in the cloud. CyberArk announced its new Privileged Session Manager for Cloud offering on Oct. 15, providing its customers with capabilities for managing and monitoring privileged cloud access. Privileged Session Manager for Cloud has its roots in technology that CyberArk gained via the acquisition of cloud security provider Vaultive on March 12. What Cy...
Enterprise Security, Platform Security, Software Security
Businesswire | May 10, 2023
CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced enhancements to its CyberArk Identity Flows orchestration solution, including new integrations with Gurucul, Proofpoint and SentinelOne. Part of the CyberArk Identity Security Platform, CyberArk Identity Flows automates risk response tasks and processes through no-code app integrations and workflows, and improves response times, efficiency and productivity.
CyberArk Identity Flows includes a user-fr...
Data Security, Enterprise Security, Software Security
CyberArk | March 15, 2023
On March 14, 2023, CyberArk, the world leader in Identity Security, announced advancements to Workforce Password Management. The cloud-based business password management solution from CyberArk allows businesses to capture, store, and manage password-based apps and other secrets in a secure manner. Added features offer administrators with increased flexibility and power to minimize risk and enhance security for web-based applications.
Workforce Password Management is developed fo...
abc6onyourside | January 15, 2020
A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE