Connected identity at the centre of everything

ForgeRock Inc. is updating its ForgeRock® Identity Platform, the first massively scalable, 100-percent commercial, open-source solution for Identity and Access Management (IAM), with new releases of OpenAM 12.0, OpenIDM 3.1 and OpenIG 3.1.

Read More

Mobility spurs major changes in enterprise governance strategies

Enterprise mobility and the proliferation of endpoints are driving profound changes in how organisations handle information governance, according to a Forrester Consulting survey commissioned by Druva. Companies are planning significant increases in governance-related spending, accelerated centralisation of governance programs, greater inclusion of endpoint content in eDiscoverydata collection initiatives, and others measures designed to address concerns over both the volume and the...

Read More

Number of victims of targeted attacks more than doubles in 2014

Kaspersky Lab has undertaken a master review of the key events that defined the threat landscape in 2014. Among a range of security incidents, targeted attacks and malicious campaigns stand out, particularly in terms of their scale and impact on businesses, governments, public and private institutions.

Read More

Nearly three in four employees (72 percent) are willing to share sensitive, confidential or...
The severity of cyber-breaches has become more and more intense in recent years. As a result,...
Ping Identity and iC Consult deliver flexible identity solutions to support employees, partners and...
The importance of an integrated IT security strategy is steadily increasing, especially in current...
Trustwave has released the 2020 Trustwave Data Security Index report which depicts how technology...
While a majority of IT professionals believe the secure sharing and transferring of files is very...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more