NEWS

Collision of privacy, cybersecurity and compliance

BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident Response Report, which leverages the metrics and insights drawn from 750 potential incidents in 2018 to help entities identify and prioritize the measures necessary to address their digital risk posture.

Read More

NEWS

Identity Engine promises 'building blocks for every identity experience

Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now possible.

Read More

NEWS

Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More

NEWS

Handy verification

Passengers travelling on domestic flights in Korea can verify their identities just by holding out a hand, improving convenience and reducing congestion.

Read More


NEWS

Majority of companies not confident about ‘business as usual’ 24 hours after a cybersecurity incident

The clock starts ticking immediately following a cybersecurity incident with the first 24 hours vital in terms of incident response. According to a new social media poll by NTT Security, the specialised security company and centre of excellence in security for NTT Group, the majority (59 per cent) of respondents admit they are not confident their company could resume ‘business as usual’ after the first 24 hours, although 41 per cent say they are.

Read More

TIBCO Software has formed an official partnership with Ping Identit. Together, TIBCO Cloud™...
Thycotic has released the findings from its 2018 VMworld survey of more than 250 IT operations...
Korean Accredited Certification Authority Koscom protects financial services with...
Attivo Networks has published the results of a new research report conducted with Kevin Fiscus of...
Survey of more than 1,000 IT security professionals reveals widespread lack of confidence in access...
Business email compromise (BEC) and ransomware attacks prove most costly phishing threats to large...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more