{"id":15539,"date":"2026-01-23T20:26:00","date_gmt":"2026-01-23T20:26:00","guid":{"rendered":"https:\/\/newestek.com\/?p=15539"},"modified":"2026-01-23T20:26:00","modified_gmt":"2026-01-23T20:26:00","slug":"identity-management-and-information-security-news-for-the-week-of-january-23rd-radware-cohesity-ping-identity-and-more","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15539","title":{"rendered":"Identity Management and Information Security News for the Week of January 23rd: Radware, Cohesity, Ping Identity, and More"},"content":{"rendered":"<div>\n<p><a href=\"https:\/\/newestek.com\/wp-content\/uploads\/2026\/01\/Identity-Management-and-Information-Security-News-for-the-Week-of-January-23rd.jpg\"><img fetchpriority=\"high\" fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-medium_large wp-image-7556\"src=\"https:\/\/newestek.com\/wp-content\/uploads\/2026\/01\/Identity-Management-and-Information-Security-News-for-the-Week-of-January-23rd.jpg\" alt=\"Identity Management and Information Security News for the Week of January 23rd\" width=\"768\" height=\"432\" srcset=\"https:\/\/solutionsreview.com\/identity-management\/files\/2026\/01\/Identity-Management-and-Information-Security-News-for-the-Week-of-January-23rd-768x432.jpg 768w, https:\/\/solutionsreview.com\/identity-management\/files\/2026\/01\/Identity-Management-and-Information-Security-News-for-the-Week-of-January-23rd-300x169.jpg 300w, https:\/\/solutionsreview.com\/identity-management\/files\/2026\/01\/Identity-Management-and-Information-Security-News-for-the-Week-of-January-23rd-1024x576.jpg 1024w, https:\/\/newestek.com\/wp-content\/uploads\/2026\/01\/Identity-Management-and-Information-Security-News-for-the-Week-of-January-23rd.jpg 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\"><\/a><\/p>\n<p style=\"text-align: justify;\"><em><strong>The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of January 23rd. This round-up covers announcements and updates from Radware, Cohesity, Ping Identity, <\/strong><\/em><em><strong>and more.<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\">Keeping tabs on all the most relevant\u00a0<strong><a href=\"https:\/\/solutionsreview.com\/identity-management\/\" target=\"_blank\" rel=\"noopener\">Identity Management<\/a><\/strong>\u00a0and\u00a0<strong><a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/\" target=\"_blank\" rel=\"noopener\">Information Security<\/a><\/strong> news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in the space by curating a collection of the latest vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy news. With that in mind, here is some of the top identity management and information security news from the week of January 23rd.<\/p>\n<p style=\"text-align: justify;\">\n<div class=\"box box3\">For early access to all the expert insights published on Solutions Review, <strong><em><a class=\"article-editor-content__link article-editor-content__link\" href=\"https:\/\/insightjam.com\/feed\" target=\"_blank\" rel=\"noopener noreferrer\">join Insight Jam<\/a><\/em><\/strong>, a community dedicated to enabling the human conversation on AI.<\/div>\n<h2 style=\"text-align: center;\"><strong>Identity Management and Information Security News for the Week of January 23rd<\/strong><\/h2>\n<hr>\n<h3><a href=\"https:\/\/www.cohesity.com\/newsroom\/press\/expanded-identity-resilience-portfolio\/\" target=\"_blank\" rel=\"noopener\"><strong>Cohesity Launches New Identity Threat Detection and Response Capabilities<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Cohesity, an AI-powered data security company, has announced new, advanced Identity Threat Detection and Response (ITDR) capabilities that expand its Cohesity Identity Resilience solution suite. These additions enable Cohesity to deliver a comprehensive approach to securing, protecting, and recovering critical identity systems such as Active Directory (AD) and Microsoft Entra ID. The new capabilities include tamperproof tracking, vulnerability assessment, automatic rollback, compliance reporting, Entra ID change tracking, service account protections, and SIEM\/SOAR integrations.<\/p>\n<p><a href=\"https:\/\/www.cohesity.com\/newsroom\/press\/expanded-identity-resilience-portfolio\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/press.pingidentity.com\/2026-01-20-Ping-Identity-Advances-Universal-Services-to-Redefine-Trust-in-the-Age-of-AI-Driven-Fraud?_gl=1*f4kcp8*_gcl_aw*R0NMLjE3NjY0MjkyMDMuQ2p3S0NBaUE5YVBLQmhCaEVpd0F5ejgySjFlWUhkZkdoYWpkYno1UHVuME8ycUVsZzFXaUE0UmM5R2xMR1FYU3NNWjN1S2Y5aTV3VTd4b0NQR3dRQXZEX0J3RQ..*_gcl_au*MTIwMzIwOTM3MC4xNzY3NjQ4OTYy*_ga*NTM3MjU5NjcxLjE3NTA5NDQwMjk.*_ga_V94KKVLZPT*czE3Njg5MTc3MDEkbzg1JGcxJHQxNzY4OTE3NzIxJGo0MCRsMCRoMTg5MzMyMzg5\" target=\"_blank\" rel=\"noopener\"><strong>Ping Identity Announces a Suite of New Identity Services<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Ping Identity, a company focused on securing digital identities, has announced Universal Services, a set of identity services that enable organizations to continuously establish, validate, and protect trust across every digital interaction. These Services are designed to deliver continuous identity assurance for customers, the workforce, partners, and non-human identities, regardless of identity provider and without forcing rip-and-replace decisions. Andre Durand, Founder and CEO of Ping Identity, says, \u201cUniversal Services give enterprises a way to continuously verify and protect identity across every interaction without dismantling the identity infrastructure they already rely on.\u201d<\/p>\n<p><a href=\"https:\/\/press.pingidentity.com\/2026-01-20-Ping-Identity-Advances-Universal-Services-to-Redefine-Trust-in-the-Age-of-AI-Driven-Fraud?_gl=1*f4kcp8*_gcl_aw*R0NMLjE3NjY0MjkyMDMuQ2p3S0NBaUE5YVBLQmhCaEVpd0F5ejgySjFlWUhkZkdoYWpkYno1UHVuME8ycUVsZzFXaUE0UmM5R2xMR1FYU3NNWjN1S2Y5aTV3VTd4b0NQR3dRQXZEX0J3RQ..*_gcl_au*MTIwMzIwOTM3MC4xNzY3NjQ4OTYy*_ga*NTM3MjU5NjcxLjE3NTA5NDQwMjk.*_ga_V94KKVLZPT*czE3Njg5MTc3MDEkbzg1JGcxJHQxNzY4OTE3NzIxJGo0MCRsMCRoMTg5MzMyMzg5\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.globenewswire.com\/news-release\/2026\/01\/20\/3221461\/0\/en\/Radware-Launches-a-New-End-to-End-API-Security-Service-Delivering-Runtime-Protection-and-Posture-Management-of-APIs.html\" target=\"_blank\" rel=\"noopener\"><strong>Radware Details Its New API Security Service Suite<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Radware, a global provider of application security and delivery solutions for multi-cloud environments, has announced its Radware API Security Service. This end-to-end solution protects APIs throughout their lifecycle by leveraging real-time production traffic. It also offers APIs with advanced protection against the OWASP Top 10 API Security Risks, including sophisticated Layer 7 DDoS attacks. Key capabilities include runtime posture management, complete runtime protection, business logic protection, and automated API discovery and visibility.<\/p>\n<p><a href=\"https:\/\/www.globenewswire.com\/news-release\/2026\/01\/20\/3221461\/0\/en\/Radware-Launches-a-New-End-to-End-API-Security-Service-Delivering-Runtime-Protection-and-Posture-Management-of-APIs.html\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/slcyber.io\/press\/searchlight-cyber-launches-ransomware-file-explorer-to-enable-pre-emptive-detection-of-leaked-data\/\" target=\"_blank\" rel=\"noopener\"><strong>Searchlight Cyber Debuts Its Ransomware File Explorer Tool<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Searchlight Cyber, an external cyber risk management platform provider, has released the Ransomware File Explorer, a new capability within its Cerberus investigation platform that provides direct, searchable visibility into file-tree data that\u2019s published on ransomware leak sites. The new feature enables analysts to determine whether sensitive documents, personally identifiable information (PII), or intellectual property have been exposed. It also supports preemptive detection to help organizations uncover third-party or supply-chain exposures, even when they\u2019re not the direct victims of an attack.<\/p>\n<p><a href=\"https:\/\/slcyber.io\/press\/searchlight-cyber-launches-ransomware-file-explorer-to-enable-pre-emptive-detection-of-leaked-data\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.sumologic.com\/newsroom\/sumo-logic-strengthens-cloud-data-security-data-pipeline-visibility-with-new-snowflake-databricks-integrations\" target=\"_blank\" rel=\"noopener\"><strong>Sumo Logic Reveals New Apps for Snowflake and Databricks<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Sumo Logic, an Intelligent Operations Platform, has announced its new Snowflake Logs App and Databricks Audit App. With these strategic apps, customers get robust visibility into their data pipelines, dependable security analytics, and faster troubleshooting across two of the industry\u2019s most prominent cloud data platforms. For example, the Sumo Logic Snowflake Logs App enables users to analyze login and access activity. optimize data pipelines and workloads, and centralize log data. Additionally, the\u00a0Sumo Logic Databricks Audit App delivers real-time detection of unauthorized access attempts, faster incident investigations, and centralized visibility.<\/p>\n<p><a href=\"https:\/\/www.sumologic.com\/newsroom\/sumo-logic-strengthens-cloud-data-security-data-pipeline-visibility-with-new-snowflake-databricks-integrations\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.globenewswire.com\/news-release\/2026\/01\/22\/3223850\/0\/en\/Token-Security-Expands-Leadership-Team-to-Accelerate-Go-To-Market-and-Product-Innovation-for-Agentic-AI-Security.html\" target=\"_blank\" rel=\"noopener\"><strong>Token Security Expands Its Leadership Team<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Token Security, an identity-first security company for agentic AI, has announced the appointment of Walt Carrington as Vice President of Sales and Oron Kaiser as Head of Product Management. These additions to Token Security\u2019s leadership team will help the company capitalize on the growing enterprise adoption of AI agents and the need to secure them. Itamar Apelblat, CEO and co-founder of Token Security, says, \u201cWith the addition of Walt and Oron, we\u2019re boosting our capabilities to scale both product innovation and sales execution, two critical elements for success as this market moves from early adoption to broad production deployment.\u201d<\/p>\n<p><a href=\"https:\/\/www.globenewswire.com\/news-release\/2026\/01\/22\/3223850\/0\/en\/Token-Security-Expands-Leadership-Team-to-Accelerate-Go-To-Market-and-Product-Innovation-for-Agentic-AI-Security.html\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/www.businesswire.com\/news\/home\/20260120799114\/en\/Trulioo-Appoints-Craig-McDonald-as-Chief-Revenue-Officer\" target=\"_blank\" rel=\"noopener\"><strong>Trulioo Appoints a Chief Revenue Officer<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Trulioo\u2014an onboarding platform that delivers identity verification, fraud prevention, and credit decisioning for people and businesses worldwide\u2014has appointed Craig McDonald as chief revenue officer (CRO). McDonald has over 25 years of industry experience, having previously held different roles at companies like Trustly, MoneyGram, Nexxo Financial, and Valista\/iPIN. In his new role, McDonald will help lead the global revenue organization by overseeing sales, customer success, and go-to-market strategy to support the company as it continues to scale and meet growing demand.<\/p>\n<p><a href=\"https:\/\/www.businesswire.com\/news\/home\/20260120799114\/en\/Trulioo-Appoints-Craig-McDonald-as-Chief-Revenue-Officer\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h2 style=\"text-align: center;\"><strong>Expert Insights Section<\/strong><\/h2>\n<hr>\n<p>Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from\u00a0<i>Insight Jam<\/i>, Solutions Review\u2019s\u00a0<a class=\"fui-Link ___10kug0w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn external\" title=\"https:\/\/insightjam.com\/share\/8qpqn88mnqikpnxu?utm_source=manual\" href=\"https:\/\/insightjam.com\/feed\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\"Link enterprise tech community for business software pros\"><strong><u>enterprise tech community for business software pros<\/u><\/strong><\/a>. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends, predictions, and vendor-neutral software evaluation tools.<\/p>\n<hr>\n<h3><a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/from-search-rankings-to-ai-citations-a-cybersecurity-cmos-guide-to-geo\/\" target=\"_blank\" rel=\"noopener\"><strong>From Search Rankings to AI Citations: A Cybersecurity CMO\u2019s Guide to GEO<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">The Solutions Review editors are exploring how and why cybersecurity companies should start prioritizing AI citations and Generative Engine Optimization (GEO) over traditional SEO practices. In this article, we examine how brands can audit their cybersecurity content for visibility in generative engines, which content to prioritize, and how to measure GEO effectiveness when traditional analytics don\u2019t apply.<\/p>\n<p><a href=\"https:\/\/solutionsreview.com\/security-information-event-management\/from-search-rankings-to-ai-citations-a-cybersecurity-cmos-guide-to-geo\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/solutionsreview.com\/why-data-literacy-is-the-key-to-unlocking-generative-ais-potential\/\" target=\"_blank\" rel=\"noopener\"><strong>Why Data Literacy Is the Key to Unlocking Generative AI\u2019s Potential<\/strong><\/a><\/h3>\n<p style=\"text-align: justify;\">Dr. Taryn Hess, the Director of Talent Enablement &amp; Transformation at EPAM Systems, explains why data literacy has become the key to unlocking the full potential of generative AI. In her article, Dr. Hess says, \u201cBy investing in data skills, culture, and human-centered AI collaboration today, organizations can position themselves for a future in which GenAI becomes not merely a tool but a transformative force for sustainable success.\u201d<\/p>\n<p><a href=\"https:\/\/solutionsreview.com\/why-data-literacy-is-the-key-to-unlocking-generative-ais-potential\/\" target=\"_blank\" rel=\"noopener\"><strong>Read on for more.<\/strong><\/a><\/p>\n<hr>\n<p style=\"text-align: center;\"><em style=\"text-align: center;\">For consideration in future news round-ups, send your announcements to wjepma@solutionsreview.com.<\/em><\/p>\n<p>The post <a href=\"https:\/\/solutionsreview.com\/identity-management\/identity-management-and-information-security-news-for-the-week-of-january-23rd-radware-cohesity-ping-identity-and-more\/\">Identity Management and Information Security News for the Week of January 23rd: Radware, Cohesity, Ping Identity, and More<\/a> appeared first on <a href=\"https:\/\/solutionsreview.com\/identity-management\">Best Identity Access Management (IAM) Software, Tools, Vendors, Solutions, &amp; Services<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of January 23rd. This round-up covers announcements and updates from Radware, Cohesity, Ping Identity, and more. Keeping tabs on all the most relevant\u00a0Identity Management\u00a0and\u00a0Information Security news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15539\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":15540,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15539"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15539\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/media\/15540"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}