BLOG

GDPR and mitigating cyber-risk

  • Published in

For digital businesses across all industries and markets, there are a number of risks which freelancers and contractors may face as a result of the new regulations. Here, Janthana Kaenprakhamroy, founder of on-demand insurance provider Tapoly, discusses the ins and outs of GDPR and the risks cybersecurity breaches can pose to freelance and contract workers in the digital age.

Read More

NEWS

Complexity clouds security effectiveness

  • Published in

Thycotic has released the findings from its 2018 VMworld survey of more than 250 IT operations professionals which looked into their experiences in using cybersecurity tools on a daily basis, including their concerns and preferences. Thycotic’s report stemming from the VMworld survey was designed to help overcome the obstacles that divide IT operations and cybersecurity functions and promote better security practices for all organizations.

Read More

NEWS

Untrained staff are the greatest security risk

  • Published in

The majority of executives (87%) around the world cite untrained staff as the greatest cyber risk to their business according to a new report from “The Cybersecurity Imperative” – a global thought leadership program produced by independent researcher, ESI ThoughtLab in conjunction with Willis Towers Watson and other organizations specialized in cybersecurity and risk management. Compounding this finding is the fact that staff training is ranked among the categories to have made the least...

Read More

NEWS

Duo Security and Exabeam partner

  • Published in

Duo Security and Exabeam have partnered to enhance and accelerate organizations’ threat protection with data-rich automated monitoring and incident response. The integrated solution, which combines Duo’s authentication and device logs with Exabeam’s Security Management Platform, helps free up time and resources for overstretched security teams by providing higher accuracy alerts, reducing time to detection and orchestrating automated response in case of anomalous behavior.

Read More

VIDEO

The powers of identity and privilege

  • Published in

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read More

BLOG

How unguarded privileged access can turn a breach into a catastrophe

  • Published in

It has become increasingly accepted by many organisations that a security breach, in some form or another, is unavoidable. Even the most robust and cutting-edge security defences can potentially be thwarted by a dedicated adversary armed with new attack techniques. From the downtime to the cost of the clear-up, the impact can be devastating: in fact, a 2017 study by Ponemon estimated that the average data breach carried a total cost of $3.62m. By Joseph Carson, Chief Security Scientist at...

Read More

With LogRhythm Cloud, security analysts get the full analyst experience of an award-winning...
Aqua integrates with Datadog to give DevOps teams real-time security metrics and events.
As ransomware actors continue to adapt, the new report underscores the importance of vigilance,...
95% of organizations are using GenAI tools in some guise.
Organisations with advanced identity security see reduced cyber risk, increased business value and...
Least effective security measures are password-protected documents, facial recognition, and access...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more