BLOG

Navigating shark-infested waters

  • Published in

Why businesses need a bigger boat for tackling IaC security By Robert Haynes, SCA & Open Source Evangelist, Checkmarx.

Read More

BLOG

Delivering an effective cybersecurity strategy

  • Published in

Cybersecurity continues to be a major challenge for companies, with as many as four in ten businesses (39%) reporting cyber security breaches or attacks in the last 12 months. By Richard Slater, Head of Managed Services at Amido.

Read More

BLOG

How Zero trust security makes the everywhere workplace possible

  • Published in

Zero trust security clearly offers the most efficient and cost-effective way to secure the everywhere workplace, which is the future of work. By Nayaki Nayyar, Executive Vice President and Chief Product Officer, Ivanti.

Read More

BLOG

A three-pronged approach to government security

  • Published in

The increase of ransomware attacks over recent years has cast a spotlight on the need for governments to adopt a risk-based approach to cybersecurity. By Adam Vincent, Co-Founder and CEO at ThreatConnect.

Read More

BLOG

Authentication best practice within a Zero Trust strategy

  • Published in

For CISOs around the world it seems at every turn, they are being told to implement Zero Trust. By Nic Sarginson, Principal Solutions Engineer, Yubico.

Read More

BLOG

Navigating the SASE Maze

  • Published in

SASE is causing a buzz right now, and for good reason. By Jonathan Lee, Senior Product Manager, Menlo Security.

Read More

Newly announced push authentication features and capabilities in the ForgeRock Identity Platform...
What's keeping IT professionals awake at night? Data storage, data access and data sharing.
New report looks at why these low-volume attacks are so costly, and how to protect your business...
Beyond Identity selects Ignition Technology to drive channel expansion in the Nordics and Benelux.
While 91% of organisations were successful in increasing security as a result of adopting cloud...
Adds single-sign-on and adaptive multifactor authentication capabilities to renowned enterprise...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more