OneLogin enhances its cloud-based IAM solution

As enterprises with large on-premise IT infrastructures migrate to the cloud,OneLogin’s new hybrid capabilities ensure that the legacy IT is not left behind.

Read More

Cybersecurity Threat Landscape - 2016 predictions

The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? For the first time as a newly combined company, Raytheon|Websense cybersecurity experts has shared security predictions for the coming year. Researchers suggest to be on the lookout for:U.S. presidential election cyber-antics; cybercriminals pickpocketing the wallet on your phone; and an increase in vulnerabilities from the aging Internet, among other...

Read More




Cyber security is low priority for UK

Despite eight out of ten IT decision makers experiencing a data or cyber security breach in their organisation in 2015, less than one-third plan to invest in cyber security technologies in 2016.

Read More

One in two (53%) organisations are exposed to undue data security risk thanks to current procedures...
Convenient and secure access to SaaS applications to enable a productive mobile workforce.
VMware has released the results of its sixth Global Incident Response Threat Report, entitled:...
Both technical teams and general staff need more frequent guidance on recognising and dealing with...
Tenable launches Nessus Cloud to deliver world-class vulnerability management capabilities for SaaS...
A survey of CIOs worldwide from Brocade (NASDAQ: BRCD) reveals the business impact of legacy...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more