Critical data at risk from employees

  • Published in

Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a new survey report that they have access to data they should not see, and more than half say that this access is frequent or very frequent.

Read More

Difference between knowing about access risk and ability to fix it

  • Published in

97% aware of risk created by misused or stolen credentials, but only 29% confident of organisation’s ability to detect improper access.

Read More

British companies at risk of becoming cyber-dominoes

  • Published in

New research from Radware shows a fifth of companies are now under constant attack.

Read More

BalaBit’s Shell Control Box is verified as Citrix Ready with Citrix XenApp and XenDesktop 7.x

  • Published in

Shell Control Box becomes a Citrix Ready verified PIM tool for Citrix 7.6 platforms.

Read More

Next-generation firewalls must evolve to remain relevant

  • Published in

By Sean Newman, security strategist, Cisco Security Business Group.

Read More

IT lacks efficiency

TeamQuest has announced the results of their Global IT Management survey with indicators on how IT processes are maturing in corporations around the globe. Over four hundred IT professionals from 10 countries participated in the study conducted by Kelton Research.

Read More

Netskope increases breadth of deployment options, making it the most flexible and comprehensive...
Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations...
Tanium survey of IT decision makers finds that enterprises are observing uptick in risky behaviours...
Fortinet has published the findings of its latest Global Threat Landscape Report. The ...
Identity leaders combine developer and enterprise expertise, offering customers more flexibility.
Absolute Software releases the results of its Mobile Enterprise Risk research.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more