Leaving the door open for hackers

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More





IT leaders prioritise Identity Governance for greater visibility.
Trust now outnumbers distrust for public clouds by more than 2-to-1.
Adept Scientific announces the availability of a highly secure, stable and reliable service for the...
Analysis of firsthand experiences of the world’s most renowned cybersecurity forensics teams...
By Dave Larson, CTO of Corero Network Security.
The University of St Andrews is seeing stars after being awarded a top honour for its IT provision.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more