According to CRN, SailPoint, an identity security vendor in Austin, Texas, will purchase New York-based SaaS application management startup Intello for an undisclosed amount. The proposed acquisition is expected to help customers in securing, managing and finding SaaS applications that are not covered by the firm, as well as to provide ungoverned SaaS applications with the right identity security controls. “With the rapid adoption and use of cloud technologies in the past year, we want to make it incredibly easy for customers to get their arms around the risk of SaaS app sprawl. Discovery combined with visibility are the name of the game here, and we’ll be able to deliver that to our customers with Intello,” according to a statement released by Grady Summers, SailPoint’s executive vice president of product. He further added that this deal “will allow SailPoint to fully secure and support this future world of work – enabling secure SaaS adoption at scale with identity security.”
Jill Aitoro is senior vice president of content strategy for CyberRisk Alliance. She has more than 20 years of experience editing and reporting on technology, business and policy. Prior to joining CRA, she worked at Sightline Media as editor of Defense News and executive editor of the Business-to-Government Group. She previously worked at Washington Business Journal and Nextgov, covering federal technology, contracting and policy, as well as CMP Media’s VARBusiness and CRN and Penton Media’s iSeries News.
Modern integrated graphics processing units, including those manufactured by AMD, Arm, Apple, Intel, Qualcomm, and Nvidia, could be targeted to expose sensitive data through the new GPU.zip side-channel attack, which exploits graphical data compression, The Hacker News reports.
U.S. critical infrastructure organizations have been noted by the Department of Homeland Security to be at risk of cyberattacks leveraging artificial intelligence, with China and other nation-states exploiting the technology to deploy more advanced malware attacks and influence operations, CyberScoop reports.