NEWS

Weak passwords cause ransomware woes

As one of the leading types of cyber-attacks, ransomware is expected to dominate cybercrime in 2020. According to PreciseSecurity.com research, weak passwords were one of the most common cybersecurity vulnerabilities in 2019, causing 30% of ransomware infections in 2019.

Read More

NEWS

CyberArk expands just-in-time capabilities

CyberArk has unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implement broader least privilege strategies. By extending just-in-time support with the ability to remove unnecessary standing access to Linux systems, CyberArk remains the only privileged access management vendor to provide comprehensive just-in-time offerings across cloud and hybrid environments and on the endpoint.

Read More

NEWS

Organisations fail to protect keys and certificates

Only 54% of security professionals admit to having a written policy on length and randomness for keys for machine identities.

Read More



NEWS

PAM for DevOps

BeyondTrust’s centralised secrets administration solution strengthens credential protection in DevOps environments.

Read More

On average, UK organisations need an additional £1.88m and 22 new IT staff each to shorten the...
Survey reveals UK office workers do not understand basic security threats and organisations are...
Lack of encryption and weak or shared passwords expose sensitive corporate and customer information.
Acquisition of Balabit enables One Identity to direct future development and create even more...
Arxan expands international presence in response to growing demand for protecting applications in...
Shell Control Box becomes a Citrix Ready verified PIM tool for Citrix 7.6 platforms.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more