SailPoint acquires SecZetta to help companies validate non-employee identities
With nearly half of today’s enterprises comprised of non-employees, organizations need to factor this growing group of identities into their approach to identity security. With SecZetta, SailPoint will be able to expand its capabilities to help com.....»»
Firms that withdrew from Russia following Ukraine invasion earn higher consumer sentiment, finds study
Following Russia's 2022 invasion of Ukraine, many companies with operations in Russia withdrew from or severely curtailed their Russian operations. For example, Dell and McDonald's ceased all operations in Russia after the invasion......»»
Family-owned businesses hold non-family CEOs more accountable than family CEOs for firm performance
Family-owned businesses account for 59% of the U.S. private workforce, with 35% of Fortune 500 companies being family-owned. Although family-owned firms employ more than half of the U.S. workforce, little is known about their operations due to the se.....»»
Dell confirms it is investigating data breach after employee info leaked
A hacker says they stole employee info on more than 10,000 people and Dell is currently looking into it......»»
A Chinese rocket narrowly missed a landing on Sunday—the video is amazing
Deep Blue Aerospace is just one of several Chinese companies working on vertical landing. Enlarge / The Nebula-1 rocket just before attempting to land on Sunday. (credit: Deep Blue Aerospace) A Chinese space startup cond.....»»
Death of young Ernst & Young employee raises questions about workplace culture
Death of young Ernst & Young employee raises questions about workplace culture.....»»
WSJ: Qualcomm wants to acquire Intel as PC makers switch from x86 to ARM
In a surprising move, chipmaker Qualcomm has been considering a full takeover of Intel, known for its computer processors. A report in The Wall Street Journal on Friday revealed that although a deal is “far from certain,” the two companies have h.....»»
Grid-scale batteries: They’re not just lithium
When size and weight don't matter, lots of other battery chemistries can work. Enlarge (credit: Petal) As power utilities and industrial companies seek to use more renewable energy, the market for grid-scale batteries is.....»»
Rising identity security risks: Why organizations must act now
As the priority for managing digital identities intensifies, organizations are encountering severe identity security risks. Recent findings indicate that many businesses are struggling with frequent breaches and inadequate security measures, particul.....»»
Striking the balance between cybersecurity and operational efficiency
In this Help, Net Security interview, Michael Oberlaender, ex-CISO, and book author, discusses how to strike the right balance between security and operational efficiency. Oberlaender advises companies starting their cybersecurity journey and stresse.....»»
AI’s hungry maw drives massive $100B investment plan by Microsoft and BlackRock
Investment "goes beyond what any single company or government can finance." Enlarge (credit: J Studios via Getty Images) If you haven't noticed by now, Big Tech companies have been making plans to invest in the infrastru.....»»
Strivacity AI Assist optimizes digital identity management
Strivacity released Strivacity AI Assist, a new “smart assistant” powered by GenAI that makes it easier to manage and secure digital identities across business-to-business (B2B) and business-to-consumer (B2C) use cases. Building on Strivacity’s.....»»
How job-hopping managers undermine corporate culture
As most successful companies will know, building effective corporate culture is very rewarding, but also challenging. It requires senior managers to create shared values and embed those values in their decisions and interactions with staff......»»
Anecdotes Trust Center simplifies compliance and security documentation sharing
anecdotes has launched Anecdotes Trust Center, a centralized platform for companies to effortlessly share compliance and security information and documentation with prospects, customers, and partners. Reflecting the company’s real-time security.....»»
In-car payments for EV charging can ease some reliability issues
Companies are enabling drivers to pay for charging from inside the vehicle......»»
Early autonomy over AI boosts employee motivation, researchers suggest
At what stage should people be given the power to overrule AI in the workplace? New research suggests sooner is better......»»
Sourcepoint helps companies mitigate vulnerabilities across various privacy regulations
Sourcepoint announced significant enhancements to its compliance monitoring suite. These solutions are designed to help companies navigate the increasingly complex landscape of digital privacy laws and mitigate risks associated with the growing trend.....»»
DirecTV and Disney end blackout, claim they will offer better channel packages
Companies promise "more flexible options" for channel and streaming packages. Enlarge / TV camera during a game between the San Francisco 49ers and Baltimore Ravens on December 25, 2023 in Santa Clara, California. (credit: Getty.....»»
eBook: Navigating compliance with a security-first approach
As cyberattacks escalate, more regulations are being introduced to help protect organizations and their customers’ data. This has resulted in a complex web of legislation with which companies in the private sector must comply. It can be challenging.....»»
New research finds employees feel pressure to work while sick, which has been shown to cost companies billions
Employees often feel pressure to work while sick, leading to lost productivity, deviant behaviors such as theft and mistreatment of coworkers and intent to leave the organization, according to new research led by University of South Florida Assistant.....»»
Organizations still don’t know how to handle non-human identities
Organizations are grappling with their current NHI (non-human identities) security strategies, according to Cloud Security Alliance and Astrix Security. The high volume of NHIs significantly amplifies the security challenges organizations face. Each.....»»