BLOG

When Identity Meets Data: A Solution for Unstructured Data

Today’s business world is driven by data, enabling employees, contractors, partners and vendors to communicate. But if this data is not protected, an organisation’s reputation and finances can be damaged. Some of this data – like financials and personally identifiable information (PII) – is priceless and requires special handling to mitigate the risk of data breaches. By Paul Trulove, CPO at SailPoint.

Read More

VIDEO

The paradigm shift of IT industry from product to services and what it means for security

According to Veniamin Levtsov, VP, Corporate Business, we’re witnessing the beginning of an era of manages service providers. In this episode of Business Matters we discuss the major paradigm shift in IT industry and what it means for IT Security that is relying more and more on such services as Threat Intelligence.

Read More

NEWS

Organisations fail to protect keys and certificates

Only 54% of security professionals admit to having a written policy on length and randomness for keys for machine identities.

Read More



NEWS

PAM for DevOps

BeyondTrust’s centralised secrets administration solution strengthens credential protection in DevOps environments.

Read More

Systems left exposed to the threat of compromised credentials, potentially resulting in...
Hidden Data Economy report exposes price points for stolen data bought and sold in cybercriminal...
The pandemic-driven shift to remote work has significantly changed how companies are investing in...
Nearly three in four employees (72 percent) are willing to share sensitive, confidential or...
Tenable launches Nessus Cloud to deliver world-class vulnerability management capabilities for SaaS...
Thycotic has expanded its PAM solution to address the risks associated with service account sprawl.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more