Search results
Lumos helps companies manage their employees' identities — and access
TechCrunch· 3 days agoSafundzic -- speaking to TechCrunch -- says that the class drove home the point that few people,...
CyberArk Goes All In on Machine Identity with Venafi Deal
Dark Reading· 3 days agoMachine identities are increasingly being targeted in attacks, so organizations need to expand their...
CyberArk to acquire Venafi from Thoma Bravo for $1.5B | TechTarget
SearchSecurity.com· 6 days agoCyberArk is expanding its identity and access management offerings by acquiring Thoma Bravo-backed Venafi for $1.5 billion. The vendor ...
Scale Ventures highlights widening resource gaps and funding challenges in cybersecurity -...
SiliconANGLE· 5 days agoA new report out today from venture capital firm Scale Venture Partners details the challenges faced...
How to Navigate the Digital Identity Landscape | Entrepreneur
Entrpreneur· 2 days agoThe identity theft landscape is anything but grayscale. Across sectors as varied as healthcare and...
CyberArk To Acquire Machine Identity Firm Venafi For $1.54B
CRN· 6 days agoThe acquisition is the largest in CyberArk’s history, according to an analyst. CyberArk announced a...
ID Verification Company AU10TIX Releases Free Risk Assessment Model | Crowdfund Insider
Crowdfund Insider· 24 hours agoAU10TIX, a global technology provider of identity verification and management, this week launched a...
Strata's Maverics Platform Provides Zero Downtime for Cloud-based Identity
Benzinga· 6 days agoStrata Identity, the Identity Orchestration company, today announced Maverics Identity Continuity, a new add-on product ...
Director Gary Kremen Acquires 25,000 Shares of Identiv Inc (INVE
Guru Focus· 6 days agoThis transaction has increased the insider's total holdings in the company to 25,000 shares. Identiv Inc is a technology firm that specializes in security technology systems ...
Council Post: Planning A Merger Or Acquisition? Ask These Five Cyber Questions First
Forbes· 2 days agoThe fast-paced amalgamation of two entities magnifies the attack surface, merges diverse IT...