| Date | Title | Description |
| 08.04.2026 | BMC Expands AI-Powered Mainframe Solutions | , the automation company for the AI era, announced new innovations with purpose-built AI embedded in the mainframe tools that operators and developers use daily. As experienced mainframe professionals retire and expertise becomes harder to ... |
| 22.01.2026 | Legacy PKI blamed for outages & rising security risk | - |
| 29.08.2025 | Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds | Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now
“With volatility now the norm, security and risk leaders need practical guidance on... |
| 03.03.2025 | Venafi launches SaaS machine identity products in Australia | - |
| 20.02.2025 | Identity is the breaking point — get it right or zero trust fails | This article is part of VentureBeat’s special issue, “The cyber resilience playbook: Navigating the new era of threats.” Read more from this special issue here.
Deepfakes, or AI-driven deception and weaponized large language models (LLMs) a... |
| 29.01.2025 | Token Security: $20 Million Raised For Securing Enterprise Machine Identities | Token Security, a leader in non-human identity security, announced $20 million in Series A funding led by Notable Capital, with participation from existing investor TLV Partners and executives from cybersecurity companies like Palo Alto Net... |
| 28.01.2025 | Token Security Raises $20M in Series A Funding | Token Security, a Tel Aviv, Israel-based non-human identity security company, raised $20M in Series A funding.
The round was led by Notable Capital, with participation from existing investor TLV Partners, Palo Alto Networks, CrowdStrike, Ch... |
| 16.12.2024 | Access tokens and service accounts next target for cyberattacks | New research shows 88 percent of security leaders believe machine identities, specifically access tokens and their connected service accounts, are the next big target for attackers.
The survey from Venafi of 800 security and IT decision-mak... |
| 31.10.2024 | Navigating the AI Landscape: Riverbed and Cisco Lead the Charge | In the ever-evolving world of technology, two giants are making waves. Riverbed and Cisco are not just keeping pace; they are setting the tempo. With strategic appointments and innovative solutions, both companies are reshaping the landscap... |
| 30.10.2024 | Riverbed Appoints Kris Luhrsen as Chief Revenue Officer | Global Leader in Observability and Digital Experience Strengthens Leadership Team with Industry Veteran
Related Posts
New Presidio Research Report Reveals Half of Companies That Adopt GenAI Aren’t Ready
Oct 30, 2024
ABBYY Unveils New Innova... |
| 01.10.2024 | CyberArk Completes Acquisition of Machine Identity Management Leader Venafi | Combined Capabilities Will Set New Paradigm for End-to-End Machine Identity Security
Newton, Mass. and Petach Tikva, Israel—CyberArk (NASDAQ: CYBR), The Identity Security Company, today announced the successful completion of its acquisition... |
| 19.09.2024 | 83 percent of organizations use AI to generate code despite concerns | A survey of 800 security decision-makers across the US, UK, Germany and France reveals that 92 percent of security leaders have concerns about the use of AI-generated code within their organization.
In spite of these concerns though the stu... |
| 18.09.2024 | Navigating the AI Frontier: Balancing Innovation and Security in Code Generation | The rise of artificial intelligence (AI) is reshaping the landscape of software development. Companies are racing to harness AI's power, particularly in code generation. Yet, this rapid evolution brings a storm of security concerns. The rec... |
| 18.09.2024 | Two-Thirds of Security Leaders Consider Banning AI-Generated Code, Report Finds | One of the most-touted benefits of the proliferation of artificial intelligence is how it can assist developers with menial tasks. However, new research shows that security leaders are not entirely on board, with 63% contemplating banning t... |
| 17.09.2024 | 83 Percent of Organizations Use AI to Generate Code, Despite Mounting Security Concerns | New Venafi Research Reveals AI- and Open Source-Powered Development Outpacing Security — With Many Security Leaders Wanting to Ban AI Code
Related Posts
TeraSignal Introduces TSLink: Protocol-Agnostic Intelligent Interconnect for Plug-and-P... |
| 02.08.2024 | The Digital Tightrope: Navigating Security in a Rapidly Changing Landscape | In the digital age, security is a tightrope walk. Businesses are grappling with new challenges, from shorter TLS certificate lifespans to the rise of generative AI. A recent survey reveals a stark reality: many organizations are unprepared ... |
| 02.08.2024 | Venafi study warns of chaos with TLS changes & quantum risks | New research from Venafi reveals that businesses globally face potential mass outages due to a lack of preparedness for new machine identity standards.
The study focuses on two key areas: the reduction of TLS certificate lifespans from 398 ... |
| 30.07.2024 | Are Organisations Ready for 90-Day TLS Certificates? | Machine identity security firm Venafi, has released a new research report, Organizations Largely Unprepared for the Advent of 90-Day TLS Certificates, examining organisations’ current state of preparedness to transition to new machine ident... |
| 30.07.2024 | Business not prepared for shift to 90-day TLS certificates | A new survey of 800 security decision-makers across the US, UK, Germany and France reveals that 76 percent of security leaders recognize the pressing need to move to shorter certificate lifespans to improve security.
However, the study from... |
| 11.07.2024 | Enterprise CX leader Avaya Announces CEO Leadership Transition | Avaya, a leader in enterprise CX, announced that Alan Masarek, President and Chief Executive Officer, will retire at the end of the calendar year. Avaya’s current Chair of the Board of Directors, Patrick Dennis, will assume the role of CEO,... |
| 10.07.2024 | ИИ получил 30% мировых инвестиций во 2 кв. 2024 года — Crunchbase | Во втором квартале 2024 года мировое финансирование стартапов выросло до $79 млрд — это на 16% больше, чем в предыдущем квартале, и на 12% больше, чем во втором квартале 2023 года, когда был инвестирован $71 млрд. Большая часть прироста в э... |
| 20.05.2024 | CyberArk Signs Definitive Agreement to Acquire Machine Identity Management Leader Venafi from Thoma Bravo | Sets New Standard for End-to-End Machine Identity Security
Provides Significant Top-Line Growth Synergies and Expected to be Immediately Accretive to Margins
Expands CyberArk’s Total Addressable Market with Complementary Machine Identity So... |
| 20.05.2024 | Израильская CyberArk купит компанию по кибербезопасности Venafi за $1,5 млрд | Компания CyberArk, базирующаяся в Израиле и зарегистрированная в США, купит компанию Venafi, расположенную в Солт-Лейк-Сити, примерно за $1 млрд наличными и $540 млн в акциях CyberArk.
Venafi — это фирма по кибербезопасности, специализирующ... |
| 20.05.2024 | Cybersecurity company CyberArk to acquire Venafi in $1.5 billion deal | :CyberArk said on Monday it will acquire cybersecurity firm Venafi from private equity firm Thoma Bravo in a deal valued at around $1.54 billion.
The Israel-based information security services provider will acquire Venafi in a combination o... |
| 03.05.2024 | New solution helps companies prepare for 90-day TLS standard | Google's proposal to cut TLS certificate lifespans to 90 days -- down from the current 398 -- was aired last year and has caused something of a stir in security circles.
According to a recent Venafi study, 83 percent of organizations have b... |
| 19.02.2024 | 90-day certificates to drive spike in outages unless businesses act now | Last year, the Chromium Project -- a Google-backed open source browser project -- released its roadmap for building a safer, faster, and more stable Internet, containing recommendations to reduce the lifespan of Transport Layer Security (TL... |
| 25.01.2024 | Venafi Launches Stop Unauthorized Code Solution to Defend Against Software Supply Chain Attacks | New Industry-First Solution Reduces Attack Surface and Hardens Enterprise Security by Preventing Malicious Code
Venafi, the inventor of machine identity management, introduced its new Stop Unauthorized Code Solution, uniquely designed to he... |
| 06.11.2023 | IT pros worry about Kubernetes security | A new survey of 800 security and IT leaders from large organizations shows 76 percent of security and IT pros believe we are heading towards a cloud reckoning in terms of costs and security.
The study from Venafi finds that 84 percent belie... |
| 03.11.2023 | How machine identity can close a critical AI accountability gap in the EU AI Act | European lawmakers are plowing ahead with what could be one of the most important pieces of legislation in a generation. The EU AI Act will take a notably more proactive approach to regulation than current proposals in the US and UK. But ex... |
| 20.09.2023 | Venafi Brings New AI Innovation to Control Plane for Machine Identities | Venafi Athena Leverages Power of Generative AI and Machine Learning to Deliver Industry’s First Intelligent Machine Identity Management Capabilities
Machine Identity Management Summit 2023 Venafi, the inventor of machine identity management... |
| 17.08.2023 | The future of AI lies in open source | I'm almost getting sick of hearing about AI and its ability to change the world for the better, for the worse, for who knows what? But when you get to the heart of what AI is and how it can be applied to unlock value in businesses and every... |
| 20.07.2023 | Designing for safety: 10 cybersecurity priorities for a zero-trust data center | Head over to our on-demand library to view sessions from VB Transform 2023. Register Here
This article is part of a VB special issue. Read the full series here: The future of the data center: Handling greater and greater demands.
Zero trust... |
| 16.06.2023 | Why machine identities are crucial to zero trust strategies | The days when businesses operated within a defined perimeter that could be neatly protected by a firewall are long gone. Today’s enterprises are dynamic. In the era of cloud native, infrastructure is completely distributed -- from the tradi... |
| 16.06.2023 | Inside AWS' quest to bake security into the cloud | Companies are routinely urged to think more about their cloud security, but a new set of products from Amazon Web Services' security team aims to help customers think about it less.
Driving the news: AWS unveiled its plan to add new securit... |
| 29.05.2023 | The Top 10 endpoint security challenges and how to overcome them | Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
One of the main reasons companies keep being breached is that they don’t know how many endpoints a... |
| 28.04.2023 | Innovation targets hard problems at RSA Conference
Rethinking identity
Next-generation approaches to securing APIs
Bringing security automation to the masses
Cybersecurity requires constant innova... | The RSA Conference 2023 is now in the books, hosting more than 40,000 attendees and hundreds of exhibitors at San Francisco’s Moscone Center and giving chief information security officers and other cybersecurity professionals a mind-numbing... |
| 19.04.2023 | New tool makes it easier to manage machine identities | Thanks to increased cloud and container use there's a growing demand for machine identities, but delivering and managing those identities can present problems.
Machine ID specialist Venafi is launching a new tool called Firefly that enables... |
| 19.04.2023 | Venafi Launches Venafi Firefly to Deliver Machine Identities for Modern, Cloud Native Workloads | Enables Organizations to Strengthen Security Posture While Accelerating Application Development
Venafi, the inventor of machine identity management, introduced Venafi Firefly, the only lightweight machine identity issuer that supports highl... |
| 17.03.2023 | Security and sustainability: HPE pursues supply chain and environmental solutions with AMD and server enhancements
Protection at silicon level
Factory integrity
Collaboration with AMD
Show your su... | When it comes to software supply chain security, IT organizations have reason to worry.
Cybersecurity Ventures predicted that the global annual cost of cybercrime will reach $8 trillion in 2023. One security trend survey conducted last year... |
| 06.03.2023 | Why machine identity management should be your focus in 2023 | There’s no doubt that the pressure on security teams is on the rise. From geopolitical tensions and nation-state attacks to the growing complexity of cloud — security professionals have had their work cut out for them to keep organizations ... |
| 27.02.2023 | Cloud security provider Wiz raises $300M for consolidated CSPM/CNAPP platform | Cloud technology has changed the data economy. Data is no longer locked in on-premise silos and servers, but traverses through a dynamic patchwork of cloud service providers, apps, APIs and containers. An unchecked vulnerability or misconfi... |
| 19.02.2023 | The battle for data security now falls on developers; here’s how they can win | Chief information officers (CIOs) rank security as the No. 1 challenge across IT organizations. And, 82% of them say their own software supply chains are vulnerable.
Therefore, as security threats continue to evolve and become more sophisti... |
| 10.02.2023 | CrowdStrike exec explains why the cloud is a ‘net-positive’ for cybersecurity | Check out all the on-demand sessions from the Intelligent Security Summit here.
In recent years, cloud computing has proven itself as one of the fundamental technologies empowering modern enterprises with on-demand connectivity. Without it,... |
| 10.01.2023 | Fast secure: Achieving secure continuous delivery of cloud native applications | Continuous integration and continuous delivery (CI/CD) are critical to achieving DevOps success across organizations -- offering the ability to get software changes into production safely, quickly, and sustainably. By reducing the time betw... |
| 06.01.2023 | Why IAM’s identity-first security is core to zero trust | Check out all the on-demand sessions from the Intelligent Security Summit here.
The faster attackers can gain control over human or machine identities during a breach attempt, the easier it becomes to infiltrate core enterprise systems and ... |
| 30.12.2022 | How leading endpoint security providers compare on enterprise performance | Check out all the on-demand sessions from the Intelligent Security Summit here.
A skilled attacker can scan and find unprotected endpoints on an enterprise network in seconds, taking just one hour and 24 minutes to move from the initial poi... |
| 29.12.2022 | More machine IDs, attacks on providers and AI verification -- identity management predictions for 2023 | Although the death of the password has been predicted for many years, older technology still clings on when it comes to verifying identities.
But that's changing, particularly with the massive growth in the numbers of machine IDs. Here is w... |
| 21.11.2022 | Много ИБ-статистики. Как перевернулся мир ИБ за три года? | Привет, Хабр! Мы с новым переводом. Нашли отличный сборник глобальной статистики в сфере информационной безопасности за период с 2020 по 2022 год. Подборку цифр из различных отчетов об утечках данных, инсайдерах и осведомленности сотруднико... |
| 04.11.2022 | Gigamon delivers pivotal advancements across deep observability pipeline with GigaVUE 6.0 release | Gigamon, the leading deep observability company, today announced an expansive set of new capabilities to the Gigamon Hawk Deep Observability Pipeline. GigaVUE 6.0, the software powering Gigamon Hawk, democratises security delivery across ne... |
| 21.10.2022 | Report: 4 in 5 companies have experienced a cloud security incident | Register now for your free virtual pass to the Low-Code/No-Code Summit this November 9. Hear from executives from Service Now, Credit Karma, Stitch Fix, Appian, and more. Learn more.
New research from cybersecurity company, Venafi, found th... |
| 15.10.2022 | Over and out: Why expired machine identities represent a growing business risk | Spotify users recently experienced an event that is becoming all-too familiar to digital consumers. They were left unable to listen to their favorite podcasts for hours after an TLS certificate at the streaming giant expired. Although certi... |
| 13.10.2022 | How cloud PAM can transform the enterprise | The cloud is winning for enterprise and cybersecurity tech stacks that need to upgrade privileged access management (PAM). Ninety-four percent of enterprises report they are using cloud services today, and 75% say security is a top concern.... |
| 13.10.2022 | Gigamon Delivers Pivotal Advancements Across Deep Observability Pipeline with GigaVUE 6.0 Release | IT organizations applaud next-generation container network visibility, application metadata integration, and cloud-scale performance for centrally processing network telemetry data
SINGAPORE, Oct. 13, 2022 /PRNewswire/ -- Gigamon, the leadi... |
| 28.09.2022 | Over 80 percent of companies have had cloud security incidents in the last year | According to a new report 81 percent of organizations have experienced a cloud-related security incident over the last 12 months, with almost half (45 percent) suffering at least four incidents.
The findings, from machine identity managemen... |
| 28.09.2022 | 81% of Companies had a Cloud Security Incident in the Last Year | Venafi, a provider of machine identity management, have announced the findings of new research that evaluates the complexity of cloud environments and its impact on cybersecurity.
The study found that 81% of organisations have experienced a... |
| 22.09.2022 | The real identity crisis: Why businesses must act on machine identities | Recent years have seen endless stories of human identity being exploited heavily in attacks. The malicious actors behind these attacks have compromised human identities (usernames, passwords and 2 factor authentication) to steal valuable da... |
| 25.08.2022 | Lloyd’s refuses to cover nation-state attacks: What it means to enterprises | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Data breaches aren’t cheap. With the average breach costing $4.24 million, many organizations are turning to cyber insu... |
| 24.08.2022 | How Russia-Ukraine cyberwar is impacting orgs: Two-thirds say they have been targeted | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Few threats concern enterprises as much as nation-state attacks. The scale and complexity of these attacks have the pot... |
| 24.08.2022 | Two thirds of companies think they may have been targets of a nation-state cyberattack | New research from Venafi into the rise of nation-state cyberattacks and their links to geopolitics has revealed that two-thirds (64 percent) of security decision-makers suspect that their organization has been directly targeted or impacted ... |
| 22.08.2022 | How cybersecurity vendors are misrepresenting zero trust | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
The zero-trust vision that cybersecurity vendors are selling isn’t the reality enterprises are experiencing. The discon... |
| 28.07.2022 | Why enterprises face challenges in protecting machine identities | Join executives from July 26-28 for Transform's AI & Edge Week. Hear from top leaders discuss topics surrounding AL/ML technology, conversational AI, IVA, NLP, Edge, and more. Reserve your free pass now!
Most enterprises do not know how... |
| 13.06.2022 | How AI and bots strengthen endpoint security | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Fast-growing ransomware, malware and endpoint-dir... |
| 03.06.2022 | Firms increasingly vulnerable to supply chain attacks, says study | Sohini Bagchi 3 Jun, 2022
While firms have stepped up their cyber security practices in recent years, many of them continue to be particularly vulnerable to cyber-attacks through their supply chains. That's according to a new study conducte... |
| 03.06.2022 | Alarming Cyber Statistics For Mid-Year 2022 That You Need To Know | Global cyber futuristic financial network security concept. Fast speed internet connection. Block ... [+] chain network getty |
| 31.05.2022 | 82 percent of CIOs believe their software supply chains are vulnerable | A new global study of 1,000 CIOs finds that 82 percent say their organizations are vulnerable to cyberattacks targeting software supply chains.
The research from machine identity specialist Venafi suggests the shift to cloud native developm... |
| 11.05.2022 | Nirmata Achieves Significant Growth led by Customer Wins, Partner Ecosystem and Record-Breaking Adoption of the Open-Source Project Kyverno, with over 200M Downloads | SAN JOSE, Calif. (PRWEB) May 11, 2022
Nirmata, the software solutions provider for policy-based security and automation of Kubernetes workloads and clusters, and creators of Kyverno, the leading policy engine designed for Kubernetes, today ... |
| 18.04.2022 | Держи свой трафик в тайне. SSL Pinning — ещё раз о том же самом | Привет, Хабр!
Меня зовут Юрий Шабалин, как вы, наверное, уже знаете, я один из основателей компании Стингрей Технолоджиз, разработчика платформы анализа защищенности мобильных приложений iOS и Android.
Сегодня я хотел бы снова затронуть тем... |
| 15.04.2022 | 10 things CISOs need to know about zero trust | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Tech stacks that rely on trust make it easy for c... |
| 23.02.2022 | Ransomware is not enough -- 83 percent of attacks now feature other extortion tactics | Ransomware itself is bad enough, but 83 percent of successful ransomware attacks now include alternative extortion methods according to a survey by machine identity company Venafi.
Popular techniques include using the stolen data to extort ... |
| 08.02.2022 | Ransomware uses malicious macros to infect target systems | A new study reveals that 87 percent of the ransomware found on the dark web can be delivered via malicious macros in order to infect targeted systems.
The research from Venafi, in partnership with criminal intelligence provider, Forensic Pa... |
| 06.02.2022 | Majority of CIOs say their software supply chains are vulnerable, execs demand action | Image: Shutterstock/PabloLagart
While supply chains are not as tangled as they were during the heart of the COVID-19 pandemic, there are still some large security issues at hand. A new survey of 1,000 CIOs conducted by Venafi shows that ove... |
| 01.01.2022 | Report: 60% of U.S. infosec professionals believe ransomware is as serious as terrorism | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more
According to a recent survey by Venafi, ransomware attacks spiked by 250% in the first half of... |
| 01.01.2022 | Report: 60% of U.S. infosec professionals believe ransomware is as serious as terrorism | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
According to a recent survey by Venafi, ransomwar... |
| 28.12.2021 | Why IoT is the cornerstone of AWS’s zero-trust strategy | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more
At its re:Invent conference this fall, AWS made two IoT cybersecurity announcements that refle... |
| 28.12.2021 | Why IoT is the cornerstone of AWS’s zero-trust strategy | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
At its re:Invent conference this fall, AWS made t... |
| 24.12.2021 | Insider threats, supply chain attacks and quantum threats -- enterprise security predictions for 2022 | The transition to remote and hybrid working has led enterprises to radically revise the way they operate. This has thrown up a variety of new challenges in ensuring systems remain secure.
Industry experts give us their views on what securit... |
| 21.12.2021 | Businesses would be less likely to pay ransoms if payments had to be reported | A new report finds that although 37 percent of respondents would pay a ransom, more than half of this group (57 percent) would reverse that decision if they had to publicly report the payment.
The Ransomware Disclosure Act, a bill currently... |
| 24.11.2021 | The machine identity crisis -- and what to do about it [Q&A] | Every single networked machine relies on an identity -- in the form of cryptographic keys or digital certificates -- so that it can identify itself and communicate with other machines securely.
In the wrong hands though machine identities c... |
| 30.10.2021 | Report: 55% of execs say that SolarWinds hack hasn’t affected software purchases | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
According to a recent study by Venalfi, more than... |
| 30.10.2021 | Report: 55% of execs say that SolarWinds hack hasn’t affected software purchases | According to a recent study by Venalfi, more than half of executives (55%) with responsibility for both security and software development reported that the SolarWinds hack has had little or no impact on the concerns they consider when purch... |
| 25.09.2021 | Executives and teams disagree on who is responsible for software security | The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. Register now!
Executives from the boardroom and the C-suite are realizing the damaging effect software supply chain attacks can have on ... |
| 25.09.2021 | Executives and teams disagree on who is responsible for software security | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Executives from the boardroom and the C-suite are... |
| 14.09.2021 | Software vendors should be held to account for insecure build environments | A new survey from Venafi reveals that 94 percent of executives believe there should be clear consequences -- such as fines and greater legal liability for companies proven to be negligent -- for software vendors that fail to protect the int... |
| 12.09.2021 | The internet is getting safer but legacy encryption techniques still linger | A new report from Venafi, based on in-depth security analysis of the world's top million websites over the last 18 months, shows the internet is becoming more secure.
Use of encryption is increasing and the adoption of newer TLS protocols i... |
| 12.09.2021 | Протокол безопасности транспортного уровня (TLS), версия 1.2 (RFC 5246) (Часть 3.1) | T. Dierks, E. Rescorla
Протокол безопасности транспортного уровня (TLS)
Версия 1.2
Запрос на комментарии 5246 (RFC 5246)
Август 2008
Часть 3.1
В статье приводится продолжение перевода на русский язык стандарта IETF - RFC 5246, описывающего ... |
| 15.07.2021 | Who is responsible for guarding against software supply chain attacks? Who knows! | Software supply chain attacks like that on SolarWinds have become more of a threat in recent months. But when it comes to defending against them businesses can't decide who is responsible according to a new report.
The study from machine id... |
| 26.06.2021 | 7 keys to evaluating zero trust security frameworks | Where does your enterprise stand on the AI adoption curve? Take our AI survey to find out.
Zero trust as a framework for securing modern enterprises has been around for years, but is drawing renewed attention with the increase in cyberattac... |
| 26.06.2021 | 7 keys to evaluating zero trust security frameworks | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Zero trust as a framework for securing modern ent... |
| 17.06.2021 | 11 Ways Businesses Can Guard Against Hackers In Times Of Crisis | Unfortunately, times of crisis can bring out the worst of bad actors. Hackers and data thieves will take advantage of the turmoil and distraction and target anyone they deem vulnerable — whether that’s large corporations or small startups. ... |
| 28.04.2021 | Akeyless Reimagines Cloud Security, Raises $14M Series A | NEW YORK and TEL AVIV, Israel (PRWEB) April 28, 2021
Akeyless, the secrets management company, today announced it has secured a $14 million Series A round of financing led by Team8 and with participation from Jerusalem Venture Partners (JVP... |
| 19.02.2021 | Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021 | Taking a Zero Trust approach to managing every machine identity authentication on a network now ... [+] could save thousands of hours and dollars in the future. getty |
| 04.01.2021 | Thoma Bravo Completes Strategic Growth Investment in Venafi | Thoma Bravo completed its strategic growth investment in Venafi, a Salt Lake City, UT-based provider of machine identity management solutions.
The deal valued the company at $1.15 billion.
Financing for the transaction was provided by Truis... |
| 10.12.2020 | Thoma Bravo Announces Strategic Growth Investment in Venafi | SAN FRANCISCO & SALT LAKE CITY–(BUSINESS WIRE)–December 10, 2020–
Thoma Bravo, a leading private equity investment firm focused on the software and technology-enabled services sector, today announced a strategic growth investment in Ven... |
| 22.10.2020 | Machine identity attacks grow more than 400 percent | The number of reported machine identity-related cyberattacks grew by 433 percent between 2018 and 2019, according to a new report from Venafi.
Between 2015 and 2019, the number of reported cyberattacks that used machine identities grew by m... |
| 01.09.2020 | Cut in TLS certificate life could lead to greater risk of outages | As of September 1st, all publicly trusted TLS certificates must have a lifespan of 398 days or less -- roughly half the previous life.
According to security experts from Venafi, a provider of machine identity management, this latest change ... |
| 04.08.2020 | Malware attacks using machine identities continue to increase | Malware attacks using machine identities doubled from 2018 to 2019 and have increased eight fold over the last decade.
New threat analysis from machine identity management company Venafi looks at security incidents and third-party reports i... |
| 30.06.2020 | TLS certificates are a top security concern for businesses | A new study by machine identity protection specialists Venafi of the opinions of 550 chief information officers (CIOs) from the US, UK, France, Germany and Australia finds that 75 percent name TLS certificates as their top concern.
TLS cert... |
| 11.06.2020 | 70 percent of security professionals say election infrastructure is at risk | A new survey of security professionals shows that 70 percent of respondents believe their governments can't adequately defend election infrastructure against domestic and international cyber attacks.
In addition the study, from machine iden... |
| 14.05.2020 | Venafi acquires Jetstack, the startup behind the cert-manager Kubernetes certificate controller | It seems that we are in the middle of a mini acquisition spree for Kubernetes startups, specifically those that can help with Kubernetes security. In the latest development, Venafi, a vendor of certificate and key management for machine-to-... |
| 14.05.2020 | Venafi to Acquire Jetstack to Accelerate and Secure Digital Transformation | Two leaders bring together the best of both worlds; developer speed and enterprise security
SALT LAKE CITY–(BUSINESS WIRE)–May 14, 2020–
Venafi®, the inventor and leading provider of machine identity protection, today announced a definitive... |