NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More


NEWS

Cybersecurity pros face increased pressures

Trustwave has released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing tensions.

Read More

Eliminating security silos

Company delivers new product capabilities to boost enterprise worker productivity via secure access to corporate data and applications.

Read More

Thycotic names Simon Azzopardi Vice President of EMEA

Thycotic, a provider of privileged account management (PAM) solutions for more than 3,500 organizations worldwide, has appointed Simon Azzopardi to Vice President of EMEA. In this role, Azzopardi will be responsible for building a world-class two-tier channel focused on delivering an unparalleled level of service to Thycotic customers. Azzopardi will also be tasked with expanding Thycotics’s presence in the EMEA region and facilitating the growth of the company into new,...

Read More


Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition...
Four in five (82%) businesses remain concerned about the security risks of employees working...
Passwords are a cornerstone method for securing access to data. However, a new survey...
Wipro has released its 2019 State of Cybersecurity Report that highlights the rising importance of...
69% of IT professionals are not confident their data would be secure if perimeter defenses were...
Solution ideal for customers maintaining sudo for non-critical Unix or Linux servers.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more