CensorNet acquires SMS PASSCODE

  • Published in

Acquisition will accelerate company’s global expansion and seize the market opportunity for a unified cloud security offering.

Read More

NEWS

Social engineering leads the list of most popular hacking methods

  • Published in

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

IT professionals overconfident in cyber attack detection

  • Published in

Industry leader evaluates confidence in seven key security controls required to detect cyber attacks on endpoints.

Read More

NEWS

Cybersecurity pros face increased pressures

  • Published in

Trustwave has released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing tensions.

Read More

Eliminating security silos

  • Published in

Company delivers new product capabilities to boost enterprise worker productivity via secure access to corporate data and applications.

Read More

Thycotic names Simon Azzopardi Vice President of EMEA

  • Published in

Thycotic, a provider of privileged account management (PAM) solutions for more than 3,500 organizations worldwide, has appointed Simon Azzopardi to Vice President of EMEA. In this role, Azzopardi will be responsible for building a world-class two-tier channel focused on delivering an unparalleled level of service to Thycotic customers. Azzopardi will also be tasked with expanding Thycotics’s presence in the EMEA region and facilitating the growth of the company into new,...

Read More

Highest priorities for IT teams are cybersecurity, cloud, data analytics and network infrastructure...
Alpha Generation Distribution, specialising in proactive security solutions will distribute...
Analysing your firm’s online habits is the first step towards bringing cyber security...
200 customers selected to take part in pilot.
New study from Beecham Research underlines how security needs urgent attention if the IoT is to...
First-in-kind solution helps businesses stop advanced, external and insider cyber attacks before...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more