NEWS

97 percent of company networks carry traces of compromise

  • Published in

Positive Technologies experts have analysed network activity of large companies (with over 1000 employees) in the key economic areas of Eastern European countries. Advanced network traffic analysis revealed suspicious activity in 97 percent of companies, and malware activity in 81 percent of companies.

Read More

NEWS

IT pros just want to be loved

  • Published in

CISOs are motivated by being the ‘business bodyguard’ despite growing pressures on the job, new research from Thycotic reveals.

Read More

NEWS

Threat intelligence to protect customers from identity cyberattacks

  • Published in

Auth0 acquires Apility.io to integrate IP reputation in Anomaly Detection capabilities; and launches Auth0 IP Signals, a free standalone API for public use.

Read More

NEWS

Privilege securty gap

  • Published in

Vectra research highlights need to continuously monitor account behaviours once access to a network has been granted.

Read More

NEWS

Cyber attacks, ransomware were unrelenting throughout 2019

  • Published in

A new F-Secure report documents ransomware getting more fearsome, but there’s reason for optimism.

Read More

NEWS

EMA’s research highlights the importance of context-aware security and zero password authentication

  • Published in

MobileIron has published the results of a research report that found passwords remain the dominant method of authentication and top cause of data breaches. The report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or user.

Read More

68% of IT organisations have no to modest confidence to manage digital threats, despite a...
Along with broad-based use of encryption and biometric technologies, expect increased focus on...
HP the first major Cloud Service Provider in the UK to receive this award and one of the first to...
Retail, Hospitality, Travel industries were hit with over 63 billion credential stuffing and 4...
iSheriff, a leading cloud security company, has appointed John Mutch as its new Chief Executive...
78 percent of security professionals believe that attackers will use AI to unleash a global cyber...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more