New Imperva Java SDK: Greasing The Wheels for Active Directory Coding Projects

According to StackOverflow’s 2018 Developer Survey, Java remains one of the world’s most popular coding languages, universally liked for its versatility and ease of...

Phishing for knowledge

When we talk about phishing, top of mind are fake banking sites, payment systems, as well as mail and other globally popular services. However,...

Protecting Industrial Operations With Shop-Floor to Top-Floor Visibility

Protecting Industrial Operations With Shop-Floor to Top-Floor Visibility #outlook a{ padding:0; }...

Centrify’s new spinout, Idaptive, named Overall Leader in KuppingerCole Leadership Compass for Cloud-based MFA...

Wow! Right out of the gate and the brand new spinout of Centrify Application and Endpoint Services as Idaptive is named as an Overall...

At SecurIT in New York, it’s a Zero Trust State of Mind

On October 29-30, Centrify will proudly sponsor the second SecurIT: the Zero Trust Summit for CIOs and CISOs in New York City. Produced by...

44% of Security Professionals Spend More than 20 Hours a Week Responding to Alerts

As the global cybersecurity climate continues to heat up, so too do the subsequent levels of alert fatigue IT security professionals have to deal...

Survey: 44% of Security Professionals Spend More than 20 Hours a Week Responding to...

As the global cybersecurity climate continues to heat up, so too do the subsequent levels of alert fatigue IT security professionals have to deal...

Defense in Depth: 4 Essential Layers of ICS Security

Defense in Depth: 4 Essential Layers of ICS Security #outlook a{ padding:0;...

Latest article

Chromium: CVE-2026-2319 Race in DevTools

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see (https://chromereleases.googleblog.com/2024 ) for more information. -...

Substack Breach May Have Leaked Nearly 700,000 User Details Online

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post...

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics - Read more

The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP

I don’t know about you, but when I think about “critical vulnerabilities,” I usually picture ransomware, data theft, or maybe a server falling over...