NEWS

Handy verification

Passengers travelling on domestic flights in Korea can verify their identities just by holding out a hand, improving convenience and reducing congestion.

Read More

NEWS

Majority of companies not confident about ‘business as usual’ 24 hours after a cybersecurity incident

The clock starts ticking immediately following a cybersecurity incident with the first 24 hours vital in terms of incident response. According to a new social media poll by NTT Security, the specialised security company and centre of excellence in security for NTT Group, the majority (59 per cent) of respondents admit they are not confident their company could resume ‘business as usual’ after the first 24 hours, although 41 per cent say they are.

Read More


NEWS

BlackBerry Cylance delivers first proactive behavioral analytics solution with CylancePERSONA

BlackBerry Cylance has introduced CylancePERSONA, said to be the first proactive, native AI behavioral and biometrics analysis solution for the security industry.

Read More


NEWS

Simplifying continuous discovery and protection in the Cloud

CyberArk has introduced 'groundbreaking' new capabilities to simplify the continuous discovery and protection of privileged accounts in cloud environments. The CyberArk Privileged Access Security Solution v10.8 is the first-of-its-kind to automate detection, alerting and response for unmanaged and potentially-risky Amazon Web Services (AWS) accounts. This version also features new industry-leading Just-in-Time capabilities that deliver flexible user access to cloud-based or on-premises Windows...

Read More

McAfee Labs dubs 2014 “Year of shaken trust”; predicts 2015 trends in Internet trust...
CyberSheath analysis of 10 benchmark cyber-attacks from 2013 uncovers stolen privileged credentials...
Seven in every ten CISOs (71%) believe cyberwarfare is a threat to their organisation, and yet just...
Around 60% of BYOD workers do not involve their company IT support in setting up their devices
More than half remain unaware of new EU General Data Protection Regulation (GDPR); Majority calls...
CIOs and IT leaders who foster a culture of digital learning and shared accountability generate...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more