The threat from internal and external cyber attackers increasingly involves stealing the passwords of system administrators with privileged accounts. Steal those passwords and you have access to the critical infrastructure of servers, databases, firewalls, routers and switches that the organisation relies on. This security flaw makes this approach a viable line of attack: a combination of passwords entrusted to users, and passwords entrusted to workstations. There are five compelling business...
Read MoreIT security professionals continuously have to tackle high levels of security alerts in the global cybersecurity space. The volume of alerts is increasing at an alarming rate making it difficult for IT to manage and maintain. By Eldad Chai, SVP Product Management, Imperva.
Read MoreThales, a leader in critical information systems, cybersecurity and data security, says that the rush to digital transformation is putting sensitive data at risk for organizations worldwide according to its 2019 Thales Data Threat Report – Global Edition with research and analysis from IDC. As organizations embrace new technologies, such as multi-cloud deployments, they are struggling to implement proper data security.
Read MoreSepio Systems, a leader in the Rogue Device Mitigation (RDM) market, introduces the next generation software solution that offers comprehensive mitigation of hardware-based cyber-attacks. The advanced mitigation capabilities protect against manipulated peripherals, transparent network devices, and firmware vulnerabilities.
Read MoreNew Research from Thycotic reveals IT security professionals feel they’re seen as the ‘doom mongers’ or a ‘necessary evil’ by employees.
Read MoreIt appears that many organisations will begin the New Year by reviewing their security infrastructure and taking a ‘back to basics’ approach to information security. This is according to the latest in a series of social media polls conducted by Europe’s number one information security event, Infosecurity Europe 2019.
Read More