Cybercriminals’ Motivations during Catastrophic Times

Brittany Haynes wrote an article about “How Criminals Are Benefitting From the COVID-19 Crisis” on March 19, 2020, which is available at https://www.igi-global.com/newsroom/archive/malicious-threat-your-inbox-covid/4477?utm_source=IGI+Global+Products+and+Publishing+Opportunities&utm_campaign=58a5a8500d-EMAIL_CAMPAIGN_Research_Trends_1_19_wk1_COPY_01&utm_medium=email&utm_term=0_bcbd627034-58a5a8500d-47781814 Haynes’s article references a March 9, 2020 article by ...
12 days of Christmas Security Predictions:  What lies ahead in 2020

12 days of Christmas Security Predictions: What lies ahead in 2020

Marked by a shortage of cyber security talent and attackers willing to exploit any vulnerability to achieve their aims, this year emphasised the need for organisations to invest in security and understand ...
SecZetta Closes $10M Series A Funding

SecZetta Closes $10M Series A Funding

Art Coviello, former Executive Chairman of RSA, joins the board. SecZetta, provider of the most comprehensive non-employee identity risk and lifecycle management platform, today announced that it closed $10M in Series A ...
S3 Partners With SecZetta to Address Third Party Identity Risk

S3 Partners With SecZetta to Address Third Party Identity Risk

NEWPORT, R.I. (PRWEB) JULY 15, 2019 SecZetta, the leading provider of third party identity risk and lifecycle management solutions, today announced that S3 has signed on to be a solutions partner bringing ...

Enzoic Part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019

Enzoic is proud to be part of Enterprise Security Magazine’s Top 10 Identity and Access Management Solution Providers for 2019. Enzoic was selected to be part of this exclusive list because of ...

Modern Database Security Buys Down More Risks for Enterprises

Pop quiz: how many data records are lost or stolen on an average day? 1 million? 3 million? 6 million? If you answered 6 million, you’re correct, according to the Breach Level ...
California Consumer Privacy Act

What is the California Consumer Privacy Act?

Societies are becoming more digitized. This makes collecting consumer data -- such as name, age, and email address -- a vital element for businesses. Potentially adding to the stress is the California ...
customer profiling

How Customer Profiling Drives Growth for Your Business

Gain deeper insights into your customers by building rich customer profiles from your first-party data. For many businesses, understanding their customer base is the biggest challenge. It’s also typically their priority #1 ...
Why a Service Account is more like a non-employee than you think

Why a Service Account is more like a non-employee than you think

Service Account Lifecycle Service accounts are challenging to manage for any organization. Unlike normal user accounts they generally are not directly owned by an individual. Good practices put a sponsor in place ...
Choosing the Best IAM Solution

Tips for Choosing the Best IAM Solution

Information is power, so only the right people must have access to it. Identity and access management (IAM) is one of the key tools you can use for ensuring corporate cybersecurity. There ...
Security Boulevard