BLOG

When Identity Meets Data: A Solution for Unstructured Data

Today’s business world is driven by data, enabling employees, contractors, partners and vendors to communicate. But if this data is not protected, an organisation’s reputation and finances can be damaged. Some of this data – like financials and personally identifiable information (PII) – is priceless and requires special handling to mitigate the risk of data breaches. By Paul Trulove, CPO at SailPoint.

Read More

VIDEO

The paradigm shift of IT industry from product to services and what it means for security

According to Veniamin Levtsov, VP, Corporate Business, we’re witnessing the beginning of an era of manages service providers. In this episode of Business Matters we discuss the major paradigm shift in IT industry and what it means for IT Security that is relying more and more on such services as Threat Intelligence.

Read More

NEWS

Organisations fail to protect keys and certificates

Only 54% of security professionals admit to having a written policy on length and randomness for keys for machine identities.

Read More



NEWS

PAM for DevOps

BeyondTrust’s centralised secrets administration solution strengthens credential protection in DevOps environments.

Read More

Gemalto has released the latest findings of the Breach Level Index, a global database of public...
In the future, seamless travel technology will enable people to transfer from their home to the...
Pulse Secure has launched its Access Now Partner Program. Designed to offer partners the means to...
Deliver secure blockchain-driven data exchange platform for the Southeast Asia market.
New high-performance NSsp firewalls, cloud-native management and on-prem threat analysis upend...
New research from data centre specialists ServerChoice shows remote working is leading to increased...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more