article thumbnail

What the IBM-Adobe Collaboration Means for Transformation

Information Week

Adobe Experience Manager running on Red Hat OpenShift and other IBM resources intended to help regulated enterprises meet security demands.

Adobe 149
article thumbnail

The Three Most Common Myths in Enterprise Security

CTOvision

I’ll say it up front, your security program does not work because it is based on three common myths we hold as unquestionable truths in enterprise security: Myth 1: We can patch our way to security. Myth 1: We can patch our way to security. So why can’t we patch our way to security?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Adobe brings first-party commerce data to customer data platform

CIO Business Intelligence

In a bid to cater to enterprise efforts to improve customer experience and drive hyperpersonalization, Adobe is integrating its Adobe Commerce suite, formerly known as Magento, with its Real-Time Customer Data Platform (CDP). Adobe’s announcement is in synch with similar announcements from rivals such as Oracle and Amplitude.

Adobe 88
article thumbnail

Adobe fixes flaws in Flash Player and Adobe Connect

Network World

Adobe Systems has released scheduled security patches for its widely used Flash Player software as well as the Adobe Connect web conferencing platform, which is popular in enterprise environments.

Adobe 96
article thumbnail

Five Keys for Better Enterprise App Security

IT Toolbox

Enterprise apps are becoming as common among businesses as office desks; roughly 66 percent of companies already are using bespoke enterprise apps for their employees, according to a report by Adobe Systems last year, and nearly 70 percent of companies that have adopted enterprise apps are using between two and

article thumbnail

Video: How enterprise companies can identify and manage emerging cyber-threats

Tech Republic Security

For the enterprise, the cloud is essential for business-but it's also a cybersecurity threat vector. Adobe's chief security officer Brad Arkin explains best practices for CXOs to manage cyber-risk in a multi-cloud environment.

article thumbnail

Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own

Network World

During the first day, they successfully demonstrated exploits against Microsoft Edge, Apple's Safari, Adobe Reader, and Ubuntu Desktop. The Pwn2Own contest runs every year during the CanSecWest security conference in Vancouver, Canada. To read this article in full or to leave a comment, please click here

Adobe 60