NEWS

Cloud cyberattacks involve compromised privileged credentials

  • Published in

Prevalence of breach attempts can be attributed to reliance on cloud as work-from-home era continues.

Read More

NEWS

Akamai combats MFA gaps

  • Published in

Akamai MFA provides FIDO2 multi-factor authentication without hardware security keys.

Read More

NEWS

Cybercrime targets digital identities

  • Published in

100% of surveyed security and IT leaders confirmed that their organisations experienced a security compromise in the last year.

Read More

NEWS

“Think before you share,” warns Veritas

  • Published in

Veritas Technologies is warning knowledge workers to ‘think before they share’ sensitive data over messaging apps as new research shows that they’re not considering the consequences before hitting ‘send’. Veritas, a global leader in data protection, availability and insights, has found that 30% of knowledge workers have been reprimanded by bosses for their use of instant messaging and business collaboration tools such as Zoom and Teams, as 71% admit to sharing business-critical data...

Read More

NEWS

Cloud-based email threats capitalised on Covid chaos

  • Published in

Trend Micro intercepted a surge in malware, phishing and credential theft.

Read More

NEWS

Top brands risk 'billions' of breaches

  • Published in

Infosys and Interbrand have revealed that the potential risk in brand value of a data breach to the world’s 100 most valuable brands could amount to as much as $223b, according to a joint cybersecurity and brand value impact report launched today. The report, called ‘Invisible Tech. Real Impact,’ examines the long-term impact of data breaches on value of the world’s top brands across sectors.

Read More

As C-level executives engage more frequently in incident response and threat hunting, more IT...
By Campbell Williams, group strategy and marketing director, Six Degrees Group.
Advances remote access to web applications such as Microsoft Office 365 and network resources to...
Prevalence of breach attempts can be attributed to reliance on cloud as work-from-home era...
According to Venafi study, machine identity related cyberattacks grew by more than 400% between...
The Information Commissioner’s Office (ICO) has published a report highlighting how...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more