July 19, 2019

CyberArk brings updates to privileged access security offering

Reporter, Products Content CyberArk Software Ltd. introduced new features to its SaaS portfolio for enhanced privileged access security and management. The vendor added CyberArk Alero to […]
July 12, 2019
How to create an access key for the root user in AWS

How to create an access key for the root user in AWS

Performing tasks with root user credentials opens AWS to potentially catastrophic security vulnerabilities. Creating and managing access keys mitigates the risk. Image: marchmeena29, Getty Images/iStockphoto Best […]
July 8, 2019

Ipsidy’s Identity Portal uses biometrics for secure access

Reporter, Products Content Ipsidy, an identity-as-a-service vendor, has released its Identity Portal for general availability. The portal, a web browser interface, enables enterprises to rapidly implement […]
June 28, 2019

Identity access management at a crossroads

WASHINGTON, D.C. — Identity access management is at a crossroads. Organizations want to modernize legacy identity infrastructure by implementing a more flexible, mobile-ready identity management system […]
May 31, 2019

Docker vulnerability with no patch could allow root access

All current Docker versions contain a vulnerability that could allow an attacker to gain root-level system access. But both Docker and the security researcher who discovered […]
(303) 647-4050