OneLogin enhances its cloud-based IAM solution

As enterprises with large on-premise IT infrastructures migrate to the cloud,OneLogin’s new hybrid capabilities ensure that the legacy IT is not left behind.

Read More

Cybersecurity Threat Landscape - 2016 predictions

The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? For the first time as a newly combined company, Raytheon|Websense cybersecurity experts has shared security predictions for the coming year. Researchers suggest to be on the lookout for:U.S. presidential election cyber-antics; cybercriminals pickpocketing the wallet on your phone; and an increase in vulnerabilities from the aging Internet, among other...

Read More




Cyber security is low priority for UK

Despite eight out of ten IT decision makers experiencing a data or cyber security breach in their organisation in 2015, less than one-third plan to invest in cyber security technologies in 2016.

Read More

Lock & Key is a component of Imation’s recently announced Secure Data Movement...
Gartner, Inc. has revealed its top predictions for IT organizations and IT users for 2014 and...
Only 34% of companies authenticate users accessing cloud data via SSO.
Atos, a global leader in digital transformation, believes waiting for digital threats to...
New Research from Thycotic reveals IT security professionals feel they’re seen as the ‘doom...
Trend Micro has released new research detailing the murky cybercrime supply chain behind much of...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more