NEWS

Training, early detection and verification are essential to increasing trust in employees

ObserveIT has published findings from a global survey of 600 IT leaders across various industries, which revealed that organisations want to trust their employees when it comes to cybersecurity, but to do so, they need to better leverage technology. The research also found that employers should develop clear cybersecurity protocols and invest more in employee training programmes and monitoring tools to verify safe user activity.

Read More


NEWS

Employees accessing cloud-based applications and data via mobile devices

Zscaler report provides insights into user behaviour and the challenges with mobility and remote access in the face of cloud transformation.

Read More

NEWS

Historic vulnerabilities and network complexity pose ongoing security risks

Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility business. The 2019 report analyzes the biggest security findings over the past year from Ixia’s Application and Threat Intelligence (ATI) Research Center resulting from historic unpatched vulnerabilities, along with growing network and application complexity.

Read More

BLOG

HR: The new central source of truth for business IT

Businesses the world over are facing ever increasing pressure to adapt and evolve their IT strategies to keep pace with technology to attract and maintain a productive, talented and happy workforce. However, it’s not just as simple as starting a fresh IT strategy, particularly as many businesses at an enterprise level have decades of legacy IT to contend with. By Dan Power, UK regional manager at OneLogin.

Read More

NEWS

MHR secures privileged access for company and clients

Thycotic says that talent management, HR payroll and people analytics solutions company MHR, has selected its Secret Server solution to manage and maintain access to its privileged accounts and associated passwords. MHR is also using Thycotic’s Secret Server to protect customers using its solutions as part of a hosted service.

Read More

Gemalto has released the latest findings of the Breach Level Index, a global database of public...
“State of Ransomware Readiness: Facing the Reality Gap” finds surveyed organizations are...
NETSCOUT SYSTEMS has released its 13th Annual Arbor Worldwide Infrastructure Security...
The Cybersecurity Resource Allocation and Efficacy (CRAE) Index reports that spending continued to...
U.S. security professionals value their personally identifiable information more than twice as...
2021 ReliaQuest Security Technology Sprawl Report reveals rapid increase in security tools limiting...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more