OneLogin enhances its cloud-based IAM solution

As enterprises with large on-premise IT infrastructures migrate to the cloud,OneLogin’s new hybrid capabilities ensure that the legacy IT is not left behind.

Read More

Cybersecurity Threat Landscape - 2016 predictions

The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? For the first time as a newly combined company, Raytheon|Websense cybersecurity experts has shared security predictions for the coming year. Researchers suggest to be on the lookout for:U.S. presidential election cyber-antics; cybercriminals pickpocketing the wallet on your phone; and an increase in vulnerabilities from the aging Internet, among other...

Read More




Cyber security is low priority for UK

Despite eight out of ten IT decision makers experiencing a data or cyber security breach in their organisation in 2015, less than one-third plan to invest in cyber security technologies in 2016.

Read More

New service, leveraging analysis from Qualys researchers, delivers a ransomware focused,...
Following in-depth analysis of the company’s latest Security Report, Check Point says a rise in...
82 percent of respondents say that privileged access management facilitates the move to...
100% of surveyed security and IT leaders confirmed that their organisations experienced a security...
HP urges businesses to protect the endpoint - new report highlights that the enterprise has become...
33% said a malware attack cost on average between £10,000 and £50,000 to remediate,...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more