NEWS

Mitigating the risks of service account sprawl

Thycotic has expanded its PAM solution to address the risks associated with service account sprawl.

Read More

NEWS

Enterprises are increasing security demands on their suppliers

Two thirds are now checking SMEs’ security training credentials, over one third make them part of the contract.

Read More

NEWS

Thales helps organizations combat the future security threats of quantum computing

Collaborations with ISARA Corporation and ID Quantique will make quantum-safe crypto more widely available to protect data in the cloud, applications and across networks.

Read More

BLOG

The future of passwords in the enterprise

Weak passwords have plagued businesses and security parameters for generations. People tend to set passwords that are easy for them to remember without considering how a weak password will impact the security of their data. This translates to corporate environments where employees tend to use personal passwords, meaning they are inevitably putting their corporate network at risk as it is now far easier for cybercriminals to get hold of an individual's’ personal information and, in turn,...

Read More

NEWS

Digital transformations are driving organisations to rethink security threats

Wipro has released its 2019 State of Cybersecurity Report that highlights the rising importance of cybersecurity defense to global leaders, the emergence of the CISO as a C-Suite role, and an unprecedented focus on security as a pervasive part of the business operations.

Read More

NEWS

Private cloud identity for the enterprise

Ping Identity has released PingCloud Private Tenant, a private cloud identity solution for the enterprise. PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment.

Read More

Data demonstrates 34.4% YoY increase in overall phishing activity with massive spikes during the...
78 percent of security professionals believe that attackers will use AI to unleash a global cyber...
Top three vectors used to exfiltrate data are database leaks, cloud applications and removable USB...
In addition, 27% of educational organisations suffered a ransomware attack, and 49% of them needed...
Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking...
Identity leaders combine developer and enterprise expertise, offering customers more flexibility.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more