NEWS

Simplifying continuous discovery and protection in the Cloud

  • Published in

CyberArk has introduced 'groundbreaking' new capabilities to simplify the continuous discovery and protection of privileged accounts in cloud environments. The CyberArk Privileged Access Security Solution v10.8 is the first-of-its-kind to automate detection, alerting and response for unmanaged and potentially-risky Amazon Web Services (AWS) accounts. This version also features new industry-leading Just-in-Time capabilities that deliver flexible user access to cloud-based or on-premises Windows...

Read More

NEWS

Fifty percent increase in Botnet stolen credentials

  • Published in

Blueliv, a leading enterprise-class cyberthreat intelligence company, has launched its 2018-2019 Annual Cyberthreat Landscape Report providing insights into emerging and evolving cybersecurity trends. The report reveals that botnet stolen credentials increased by a staggering fifty percent in 2017-2018, with technology and telco sectors being the target for over half of those stolen.

Read More

NEWS

Companies stuck in continuously reactive cybersecurity response cycle

  • Published in

IT decision makers are facing major challenges between dynamic adversaries, significant legislation and regulation requirements, business digital transformation needs, and a rapidly-growing array of technology solutions. Ideally, business requirements would be the key motivator for an organisation’s approach to cybersecurity strategy. But, nearly two out of three U.K.-based IT and security decision makers say their security programme is continuously reactive due to constantly changing...

Read More

NEWS

Unified access management can drive dynamic marketplaces

  • Published in

OneLogin has released a study that found the workforce, workplace, and the technologies that support them will be so different by 2025 that enterprises need to provide global access and ensure continuous uptime now. Enterprises must start addressing global digital transformation strategies, including Unified Access Management, to remain agile and relevant.

Read More

NEWS

Cybercriminals earning over $3B annually exploiting social platforms

  • Published in

Ready availability of hacking tools, wildfire spread of malware and proliferation of cryptomining has seen social media-enabled cybercrimes grow by more than 300-fold.

Read More

NEWS

Attack on critical national infrastructure is imminent

  • Published in

Convergence between physical and cyber environments is leaving businesses exposed.

Read More

Global businesses have seen cyber-attacks rise as the world continues adjusting to remote working...
Easy to follow staff education and training toolkit on data security issues.
Alert Logic has released its latest cybersecurity analysis, "Critical Watch Report: The State of...
As Internet-connected devices increase in popularity at home and work, consumers express mixed...
Trend Micro has revealed that global organizations have on average 29 security monitoring solutions...
Enterprises are looking at newer and more agile IT security solutions, as ‘bring your own...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more