NEWS

Delivering an enhanced authentication experience

  • Published in

Employing multi-factor authentication (MFA) when accessing important or sensitive web-based resources is considered a best practice for individuals and businesses looking to maintain protection against cyber-threats.

Read More

NEWS

Governing and managing cloud lay form access

  • Published in

As cloud transformation accelerates, ThycoticCentrify’s cloud provider solution for AWS provides privileged access management capabilities to continuously discover and manage AWS EC2 instances in real time with password vaulting, access controls, and privilege elevation.

Read More

NEWS

Ping Identity and ProofID help secure Tesco Bank

  • Published in

Ping Identity’s flexible solutions improve customer experience and help achieve compliance.

Read More

NEWS

COVID-19 surge in digital interactions has exposed organisations to more cyber security threats

  • Published in

Protecting against cyber attacks is a bigger IT budget priority than digital transformation over the next 12 months.

Read More

NEWS

CEOs and CISOs doubling down on cybersecurity

  • Published in

90% adopting or considering SASE, 74% reallocated funds to cybersecurity among multiple indicators of cybersecurity’s impact on innovation, transformation and integration.

Read More

NEWS

Cyber-crime costs exceed $1 trillion

  • Published in

US pipeline cyberattack is a ‘timely reminder’ highlighting the need for cyber insurance, Bloomberg Intelligence says.

Read More

Global universities now have access to the largest, most current compendium of information and...
Program enables reseller partners to capitalise on rapidly growing market demand for...
By Poul Nielsen - Director of Strategy, Nexthink.
Cloud adoption will continue to rise next year as concerns over security remain.
48 per cent say beating cyber hacking ‘very important’ if digital transformation is to succeed.
During penetration testing performed as an internal attacker, Positive Technologies researchers...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more