NEWS

Ping Identity launches Cloud Services

  • Published in

PingOne Services provide multi-factor authentication and real-time threat detection for stronger overall customer and workforce security.

Read More

NEWS

Forcepoint and Fujitsu shine a light on Shadow IT

  • Published in

Addressing cloud security challenges through Fujitsu Managed Security Services.

Read More

NEWS

Passing on passwords

  • Published in

Password-related challenges continue in remote work environment; Passwordless Authentication proves to be a secure and simple option.

Read More

NEWS

Remote working leads to increases in cyber attacks

  • Published in

Global businesses have seen cyber-attacks rise as the world continues adjusting to remote working practices brought on by COVID-19, with 65% of organisations noting they have either been breached or exposed to an attack. That’s one of the key findings from HLB’s Cybersecurity Report which launched recently.

Read More

NEWS

Dynamic user protection

  • Published in

Forcepoint Dynamic User Protection brings mainstream UAM and insider threat protection with SaaS-based solution designed for the programmable cloud featuring lightweight agent, no policy configuration via built-in Indicators of Behavior and real-time analytics for complete view of risk activity to secure employees and critical data in today’s remote work era.

Read More

NEWS

Half of organisations experience remote working security incidents

  • Published in

With the majority of companies believing the future of work will be remote or “hybrid”, Tessian reveals the security pitfalls of the new work-from-anywhere world.

Read More

Accellion, Inc. has enhanced its enterprise-grade security features by including two-factor...
Despite increase in cases during lockdown, one-in-five admit they couldn’t access a working...
Bomgar’s annual Privileged Access Threat Report highlights that privileged insider and...
AirWatch by VMware and Mobile Iron lead adoption for security capabilities in the Enterprise...
Blue Coat Systems, Inc. says that 71 percent of hostnames appeared for just 24 hours. While the...
200 customers selected to take part in pilot.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more