Logo

Difference between knowing about access risk and ability to fix it

  • Published in

97% aware of risk created by misused or stolen credentials, but only 29% confident of organisation’s ability to detect improper access.

Read More

British companies at risk of becoming cyber-dominoes

  • Published in

New research from Radware shows a fifth of companies are now under constant attack.

Read More

BalaBit’s Shell Control Box is verified as Citrix Ready with Citrix XenApp and XenDesktop 7.x

  • Published in

Shell Control Box becomes a Citrix Ready verified PIM tool for Citrix 7.6 platforms.

Read More

Next-generation firewalls must evolve to remain relevant

  • Published in

By Sean Newman, security strategist, Cisco Security Business Group.

Read More

IT lacks efficiency

TeamQuest has announced the results of their Global IT Management survey with indicators on how IT processes are maturing in corporations around the globe. Over four hundred IT professionals from 10 countries participated in the study conducted by Kelton Research.

Read More

Delivering key privileged access controls for ISO/IEC standards

  • Published in

New whitepaper guides organisations to address ISO/IEC 27002 security controls with the CyberArk solution.

Read More

Sophos has announced the expansion of their product portfolio on AWS Marketplace with the addition...
During penetration testing performed as an internal attacker, Positive Technologies researchers...
A report from The Ponemon Institute reveals that two-thirds of the time spent by security staff...
Corero Network Security has released the findings of its inaugural Quarterly DDoS Trends and...
Akamai MFA provides FIDO2 multi-factor authentication without hardware security keys.
The Open University says businesses need to understand the importance of building cyber-security...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more