Logo

Leaving the door open for hackers

  • Published in

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More

Becrypt announces continued expansion in North America

  • Published in

Leading solutions provider for government information systems chooses Becrypt’s cyber security solutions.

Read More

Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash spending on ICT are proving harder to deliver on than previously expected.

Read More

Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

  • Published in

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More

SecureAuth announces international expansion into Europe

  • Published in

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More

77 percent of executives ‘confident’ in basic security controls

  • Published in

Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of network devices.

Read More

New security solution unifies security and usability, enabling users to easily send, read, store...
Attivo Networks has published the results of a new research report conducted with Kevin Fiscus of...
Trend Micro has published new research revealing that 90% of IT decision makers claim their...
79% of CIOs are concerned that users might ignore IT policies and guidelines, increasing security...
uawei will work with European partners to develop an industry ecosystem that accelerates the pace...
A third of companies do not have a data breach response plan.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more