Companies need to stop divorcing themselves from cyber security

The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to June last year over 30 per cent of data breaches involving the loss of personally identifiable information (PII) were caused by internal intrusions -- while a further 29 per cent were caused either accidentally or maliciously by employees. Richard Pharro, CEO of APM Group, gives his opinions on the issue.

Read More



Targeted data analytics provides faster time to attack detection over Big Data approach.
Nearly half of office workers have been afforded unfettered access to sensitive company data.
Only 54% of security professionals admit to having a written policy on length and randomness for...
Systems Management now provides greater control in patch management.
Forcepoint Dynamic User Protection brings mainstream UAM and insider threat protection with...
Corero Network Security has published the findings of its Trends and Analysis Report for the first...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more