Search results
Entrust fights deepfakes, phishing, and account takeover attacks with AI-powered identity-centric...
Retail Banker International via Yahoo Finance· 15 hours agoEntrust has launched a single-vendor enhanced authentication solution that integrates identity...
Umaimah Khan Creates Opal Security To Solve Identity Access Management
Forbes· 4 days agoUmaimah Khan is used to solving problems on her own. Opal Security was co-founded by Khan in San...
New Oleria service aims to tackle modern identity challenges in cybersecurity - SiliconANGLE
SiliconANGLE· 4 days agoAdaptive and autonomous security access solutions startup Oleria Corp. today announced the general...
Frontegg Supports Rapidly Growing Client Base, Appointing Oren Yaqobi as VP of Customer Success
Yucaipa News Mirror· 2 days agoFrontegg, a premier customer identity and access management (CIAM) platform, is excited to announce the appointment of Oren Yaqobi as ...
BeyondTrust Report: Microsoft Security Vulnerabilities Decreased by 5% in 2023
TechRepublic· 19 hours agoThe number of Microsoft vulnerabilities has mostly flattened in 2023, with elevation of privilege...
Small Business - Shelby County Reporter | Shelby County Reporter
The Shelby County Reporter· 1 day agoIdentity Governance & Administration Market Projected to Reach $24.42 billion by 2030 - Exclusive Report by 360iResearch PR Newswire PUNE, India, April 25, 2024 PUNE, India ...
WidePoint Awarded $22.7 Million in Tech and Cyber Security Services Contracts During Q1 2024
Digital Journal· 4 days agoWidePoint is recognized for pioneering technology solutions that include Identity and Access Management (IAM, Mobility ...
BIO-key International, Inc. Receives Notice of Non-Compliance from Nasdaq
Morningstar· 5 days agoBIO-key International, Inc. (Nasdaq: BKYI), an innovative provider of workforce and customer identity and access management (IAM) < ...
CyberArk (CYBR) Begins Hosting Its Security Platform From UAE
Zacks via Yahoo Finance· 3 days agoCYBR’s locally-hosted arrangements for the new offering will.... Quote Hosting CyberArk’s Identity...
Key Security Considerations for Protecting Cloud-based Workloads
Digital Journal· 2 days agoEndnote Securing cloud implementation workflows requires adopting a comprehensive approach incorporating various security measures and precautions. Through the establishment of high-grade < ...