NEWS

Privilege securty gap

Vectra research highlights need to continuously monitor account behaviours once access to a network has been granted.

Read More

NEWS

Cyber attacks, ransomware were unrelenting throughout 2019

A new F-Secure report documents ransomware getting more fearsome, but there’s reason for optimism.

Read More

NEWS

EMA’s research highlights the importance of context-aware security and zero password authentication

MobileIron has published the results of a research report that found passwords remain the dominant method of authentication and top cause of data breaches. The report also highlighted the importance of a zero trust security strategy that provides context-aware, conditional access to a device or user.

Read More

NEWS

Warrington Borough Council selects Pulse Secure

Pulse Secure Elite Partner DXC delivers upgraded secure access without user disruption to help the council better manage third-party service delivery and flexible working.

Read More

NEWS

Measuring and improving operational security

Keysight’s Threat Simulator delivers actionable recommendations for addressing vulnerabilities and real-time threat intelligence.

Read More

NEWS

Delivering Privilege Management as a Service

BeyondTrust has introduced the new Privilege Management SaaS, supporting Windows desktops/servers and MacOS. By delivering its leading Endpoint Privilege Management solution via a SaaS management platform, BeyondTrust is making it even easier for customers to eliminate unnecessary privileges and stop malicious attacks by enforcing least privilege on Windows and Mac systems.

Read More

With 2017 being yet another rollercoaster year for cyber security, experts at Fareham-based...
The SonicWall Capture Labs threat research team has published the mid-year update to the 2020...
Adds single-sign-on and adaptive multifactor authentication capabilities to renowned enterprise...
Attackers using COVID-19 pandemic to launch attacks on vulnerable organisations.
The third quarter of 2015 has seen information and IT systems of different security agencies and...
Knowledge-based identification may be the preferred way to authenticate online, but for how...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more