Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More





MobileIron has published the results of a new consumer sentiment study, which revealed QR codes are...
Full end-to-end IT deployment from the desktop to the data centre.
Thycotic has expanded its PAM solution to address the risks associated with service account sprawl.
Almost 1/5 have suffered at least one data breach in the last two years .
FIPS 140-2 compliance assures companies and government agencies that CipherCloud’s products...
By Dave Larson, CTO and VP Product at Corero Network Security.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more