Friday, 19th April 2019
Logo
NEWS

Employees accessing cloud-based applications and data via mobile devices

Zscaler report provides insights into user behaviour and the challenges with mobility and remote access in the face of cloud transformation.

Read More

NEWS

Historic vulnerabilities and network complexity pose ongoing security risks

Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility business. The 2019 report analyzes the biggest security findings over the past year from Ixia’s Application and Threat Intelligence (ATI) Research Center resulting from historic unpatched vulnerabilities, along with growing network and application complexity.

Read More

NEWS

MHR secures privileged access for company and clients

Thycotic says that talent management, HR payroll and people analytics solutions company MHR, has selected its Secret Server solution to manage and maintain access to its privileged accounts and associated passwords. MHR is also using Thycotic’s Secret Server to protect customers using its solutions as part of a hosted service.

Read More

NEWS

Collision of privacy, cybersecurity and compliance

BakerHostetler’s privacy and data protection team has released its 2019 Data Security Incident Response Report, which leverages the metrics and insights drawn from 750 potential incidents in 2018 to help entities identify and prioritize the measures necessary to address their digital risk posture.

Read More

NEWS

Identity Engine promises 'building blocks for every identity experience

Passwordless authentication, progressive profiling, per-app branding and unlimited use cases now possible.

Read More

NEWS

Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More

A majority of IT organisations are kept in the dark when it comes to protecting corporate data in...
While 82 percent of respondents believe the IT security industry is making progress against cyber at...
Herjavec Group has acquired Sysec™, an IT security solutions provider headquartered in the...
Dell’s end-to-end Connected Security approach ensures both outside-in and inside-out protec...
Trustwave and Osterman Research have released results of a new study on cybersecurity resource li...
Some security predictions for next year from Chris Pace, head of product marketing, Wallix.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more