Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to research by global technology company Nuix.

Accelerating incident response

CyberArk has introduced advanced insider threat detection capabilities available through the CyberArk Privileged Account Security Solution to automatically detect and alert on high-risk privileged activity during user sessions and enable rapid response to in-progress attacks.

Reimagining identity strategies

RSA, a Dell Technologies business, has showcased a series of enhancements to its RSA SecurID® Access offerings, helping to enable organizations to provide stronger identity protection without sacrificing ease of use or forcing users to take on additional security burdens.

RSA launches Risk & Cybersecurity Practice

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that helps operationalize Business-Driven Security™ architecture by helping to reduce business risk through systematic and continuous enablement for clients to manage identity, protect their assets, and detect, respond and recover from cyber attacks.

Forcepoint launches new businesses

Global cybersecurity leader Forcepoint has established four market-centric business units. Forcepoint’s businesses – Cloud Security, Network Security, Data & Insider Threat Security and Global Governments – will drive innovation across each product portfolio, while teaming to deliver systems that enable companies to provide open, unobstructed access to critical data and intellectual property everywhere, while reducing risk.

Reducing privileged credential risk

CyberArk has issued a new research report that recommends an accelerated 30-day plan to improve protection of privileged credentials. The report outlines a proven framework for rapid risk reduction based on lessons learned from several large data breaches and best practices from a panel of Chief Information Security Officers (CISOs) at Global 1000 enterprises.

Connected successfully