All blogs

Venafi automates machine identity code recipes for developers

Venafi automates machine identity code recipes for developers

Computers, like people, are things. We all have a number of unique identifiers, a selection of defining characteristics and a range of parameters that describe who we are, where we exist, when we came to be and how we fill some kind of role in a system, service or society. Like us, machines have id... Read more

date3 days ago
Last week in ransomware: Caesars and KNVB pay, MGM struggles on

Last week in ransomware: Caesars and KNVB pay, MGM struggles on

Over the past week, several ransomware incidents illustrated the dilemmas a company faces once they fall victim to a ransomware gang. Pay up or struggle on? Each victim of a ransomware attack deals with the problem differently. Some see the best opportunity in negotiating with the hackers behind... Read more

date10 days ago
What does effective security awareness training look like?

What does effective security awareness training look like?

Hackers can find an entry point into your company's digital spaces through your employees. A popular technique among hackers to get in is phishing, where an employee is tricked into sharing personal data or installing malware. For IT professionals, the attack may be familiar, but what about managem... Read more

date14 days ago
Jim Goodnight considers later SAS IPO: ‘It will be in 2025’

Jim Goodnight considers later SAS IPO: ‘It will be in 2025’

During SAS Explore, we had an interview with Jim Goodnight, the co-founder and CEO of SAS. We asked him for an update on the initial public offering (IPO). SAS' original plan to go public in 2024 no longer seems within reach. "It will be 2025," Goodnight said. When asked why 2024 is the right ti... Read more

date14 days ago
1 2 3 74