NEWS

Mitigating the risks of service account sprawl

Thycotic has expanded its PAM solution to address the risks associated with service account sprawl.

Read More

NEWS

Enterprises are increasing security demands on their suppliers

Two thirds are now checking SMEs’ security training credentials, over one third make them part of the contract.

Read More

NEWS

Thales helps organizations combat the future security threats of quantum computing

Collaborations with ISARA Corporation and ID Quantique will make quantum-safe crypto more widely available to protect data in the cloud, applications and across networks.

Read More

NEWS

Digital transformations are driving organisations to rethink security threats

Wipro has released its 2019 State of Cybersecurity Report that highlights the rising importance of cybersecurity defense to global leaders, the emergence of the CISO as a C-Suite role, and an unprecedented focus on security as a pervasive part of the business operations.

Read More

NEWS

Private cloud identity for the enterprise

Ping Identity has released PingCloud Private Tenant, a private cloud identity solution for the enterprise. PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment.

Read More

NEWS

Resource shortage is the biggest security challenge

Respondents identify people as biggest source of cyber threats, with Facebook and BA as most notable breaches – but skills shortage has bolstered employment prospects.

Read More

Skyhigh Networks’ founder and CEO, Rajiv Gupta, outlines his top cyber security and cloud...
Centrify Identity Platform now supports both Partner Identity Management and Customer Identity...
The risk of a serious cyber attack on civil nuclear infrastructure is growing, as facilities become...
The appointment of channel veteran, Graeme Verroken, at Allot Communications has signalled renewed...
Report highlights opportunity for security leaders to rethink and transform cybersecurity...
More than three-quarters (88%) of hackers can break through cybersecurity defences and into the...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more