Leaving the door open for hackers

  • Published in

Courion asks: how secure are your service accounts? Most don’t realise the number of service accounts that exist within their organisation, frequently with default password settings created during software installation still in place. The problem is, service accounts typically provide privileged access to valuable and confidential data. Because service accounts are not proactively managed, they represent an especially attractive target to a hacker.

Read More

Becrypt announces continued expansion in North America

  • Published in

Leading solutions provider for government information systems chooses Becrypt’s cyber security solutions.

Read More

Central government ambitions to slash ICT costs are hard to fulfil

New research from analyst firm Kable suggests that highly-publicised government targets to slash spending on ICT are proving harder to deliver on than previously expected.

Read More

Risk:Value report reveals majority of UK senior executives expect to suffer a security breach

  • Published in

NTT Com Security research shows company insurance failing to cover for security beaches.

Read More

SecureAuth announces international expansion into Europe

  • Published in

Award-winning authentication provider appoints Bruce Jubb as Director for EMEA.

Read More

77 percent of executives ‘confident’ in basic security controls

  • Published in

Twenty-seven percent of IT professionals ‘not confident’ in the secure configuration of network devices.

Read More

Webroot has announced expansion of its enterprise-class security solutions with the introduction of...
Netwrix survey reveals that 33% of financial organisations discovered sensitive data in insecure...
Centrify-commissioned study reveals IT practitioners most concerned about losing jobs.
Drop-in solution identifies security and compliance violations in BYOD, cloud, and Virtual...
Mobility is transforming how enterprises do business, and most organisations expect the burgeoning...
24 percent of critical infrastructure employees have already connected an Internet of Things device...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more