NEWS

Passwords are failing IT security

Passwords are a cornerstone method for securing access to data. However, a new survey published by cyber security vendor Lieberman Software Corporation revealed that over three-quarters (77%) of IT professionals believe passwords are failing IT security. The study, carried out at RSA Conference 2016, looked at the attitudes of nearly 200 cyber security professionals. It also found that 53% of those surveyed thought that modern hacking tools could easily break passwords within their...

Read More

NEWS

Concerns over lack of security automation

Huge demand for security automation driven by the growing number and sophistication of cyber threats, business transformation initiatives, and security change management.

Read More

Low expectations of online security

New survey offers unique perspective into the state of privacy and the Apple-FBI debate.

Read More

BLOG

Guess Who? – the game of authentication and fraud detection

By Amit Desai, Senior Director of Solutions Marketing, Verint-Systems.

Read More

Cloud transformation made easy

T-Systems and OneLogin turn 4,000 interfaces into one.

Read More

Privileged security

Bomgar Vault helps companies secure, manage, and administer shared credentials for privileged users and IT vendors.

Read More

Forcepoint Dynamic User Protection brings mainstream UAM and insider threat protection with...
Prioritising Privileged Access Management helps protect businesses from insider risks and external...
Threat intelligence will be the most crucial skill for next gen security professionals.
Systems left exposed to the threat of compromised credentials, potentially resulting in...
New research by cybersecurity expert Mimecast shows the growing divide in cybersecurity awareness...
Effectiveness comes with complementary investments in human-machine teaming.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more