Trained developers get rid of more vulnerabilities than code scanning tools

An EMA survey of 129 software development professionals uncovered that for those using code scanning tools, only 10% of organizations prevented a higher percentage of vulnerabilities than organizations not using code scanning tools, while continuous tr… Continue reading Trained developers get rid of more vulnerabilities than code scanning tools

How companies are prioritizing infosec and compliance priorities

New research conducted by Enterprise Management Associates (EMA), examines the impact of the compliance budget on security strategy and priorities. It describes areas for which companies prioritize information security and compliance, which leaders con… Continue reading How companies are prioritizing infosec and compliance priorities

DuploCloud unveils a unified platform for DevOps automation and compliance

DuploCloud unveiled a new version of its unified cloud DevOps and compliance platform. New advancements include compliance standards HITRUST and NIST, as well as SOC 2, PCI, GDPR, and HIPAA, an intuitive easy-to-use interface, and integrated diagnostic… Continue reading DuploCloud unveils a unified platform for DevOps automation and compliance

Obstacles and threats organizations face when protecting AD

Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the obstacles and threats organizations face when protecting AD and how they adapt to … Continue reading Obstacles and threats organizations face when protecting AD

Stacklet Platform delivers frictionless governance that accelerates cloud adoption in large-scale environments

Stacklet announced Stacklet Platform, which allows cloud engineering and security teams to easily understand, codify, and automate cloud governance for a frictionless experience for development teams and rapid cloud adoption. Developed by the creators … Continue reading Stacklet Platform delivers frictionless governance that accelerates cloud adoption in large-scale environments

Passwords still dominant authentication method, top cause of data breaches

Passwords remain the dominant method of authentication and top cause of data breaches, according to MobileIron. A new report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device o… Continue reading Passwords still dominant authentication method, top cause of data breaches

How important is packet capture for cyber defense?

Organizations using full packet capture are better prepared to battle cyber threats, according to an Enterprise Management Associates (EMA) report. Visibility and accuracy of packet capture The report highlights that the visibility and accuracy of pack… Continue reading How important is packet capture for cyber defense?

Deception technology shifts power back to the defender

Users of deception technology reported a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network when compared to those unfamiliar with the technology, according to a research report conducted b… Continue reading Deception technology shifts power back to the defender