Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

PAM360 now includes native cloud infrastructure entitlements management capabilities

We are elated to announce the successful completion of PAM360’s Cloud Infrastructure Entitlements Management (CIEM) beta program. With PAM360, ManageEngine’s enterprise PAM suite, you can now manage cloud entitlements and associated access policies from a central dashboard that enhances visibility into otherwise siloed cloud margins like never before.

Understanding the Implications of the New Australian Cyber Security Act for Your Organisation

The newly passed Australian Cyber Security Act is part of the reform laid out in the 2023–2030 Australian Cyber Security Strategy. The legislation aims to fill gaps in Australia’s overall cyber resilience and support the government’s ambition to become the most secure country globally.

Mobile Device Management: What Is It and Why Isn't It Enough?

Nine in ten Americans now own a smartphone, according to a 2024 Pew Research study. And these smartphones are increasingly being used for work. A general rise in remote work since the COVID-19 pandemic has led to an increase in the usage of mobile devices and personal software for work purposes, as people report in from home, coffee shops, or anywhere. This increased mobility offers many benefits for workers.

Measuring AppSec success: Key KPIs that demonstrate value

In the software development industry, proactively securing the software development life cycle (SDLC) from cyber threats must always be a top priority. Taking a shift left approach addresses security early on so your development teams can spend more time innovating and less on dealing with vulnerabilities. But that’s just the beginning.

Using Endpoint Detection and Response (EDR) in Mobile Defense

Endpoint detection and response (EDR) has been a standard method for securing on-premises devices for years. When combined with antivirus software, it’s proven an effective way to uncover threats before they can cause severe damage. However, the growth of smartphones and other mobile devices means more and more work is getting done outside of the office. Organizations can no longer rely on traditional EDR protections as millions more endpoints are now exposed to the threat of a cyber attack.

NIS2 Compliance Advice from Luxembourg's Regulatory Authority

NIS2 is a transformative directive reshaping how organizations across Europe and the globe approach cybersecurity, supply chain management, and operational resilience. A lot has been written about compliance strategies, but what does NIS2 mean in practice? We’ve asked the Institut Luxembourgeois de Régulation (ILR), Luxembourg’s national regulatory authority responsible for overseeing the implementation and enforcement of NIS2 in the country.

Fireblocks x Google Cloud's Confidential Space to Enhance Digital Asset Security

We are excited to announce our new integration with Google Cloud’s Confidential Space, which dramatically enhances the security of customer digital assets. This integration solves a critical challenge in cryptocurrency security: private key management. By leveraging Confidential Space, Fireblocks customers can ensure that no single party has full access to private keys, significantly reducing the risk of theft or misuse.