NEWS

A record high of 858 total Microsoft vulnerabilities were discovered in 2019

Report finds that removing admin rights from endpoints would mitigate 77% of all Critical Microsoft vulnerabilities from last year.

Read More

NEWS

97 percent of company networks carry traces of compromise

Positive Technologies experts have analysed network activity of large companies (with over 1000 employees) in the key economic areas of Eastern European countries. Advanced network traffic analysis revealed suspicious activity in 97 percent of companies, and malware activity in 81 percent of companies.

Read More

NEWS

IT pros just want to be loved

CISOs are motivated by being the ‘business bodyguard’ despite growing pressures on the job, new research from Thycotic reveals.

Read More

NEWS

Threat intelligence to protect customers from identity cyberattacks

Auth0 acquires Apility.io to integrate IP reputation in Anomaly Detection capabilities; and launches Auth0 IP Signals, a free standalone API for public use.

Read More

NEWS

Privilege securty gap

Vectra research highlights need to continuously monitor account behaviours once access to a network has been granted.

Read More

NEWS

Cyber attacks, ransomware were unrelenting throughout 2019

A new F-Secure report documents ransomware getting more fearsome, but there’s reason for optimism.

Read More

A study conducted by MIT Technology Review finds that 96% of security leaders are now preparing for...
Nearly two-third (63%) of infosec professionals falsely believe or don’t know that a...
Survey results released by Enterprise Management Associates and Pulse Secure reports that 60% of...
Third instalment of 2019 Security Report highlights the cloud and mobile attack vectors used to...
Solution provider becomes one of the first to complete new NAC Ignite certification highlighting...
Capgemini Deutschland GmbH has been awarded three framework agreements with the Data Processing and...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more