NEWS

Okta launches risk-based authentication solution

Risk-based authentication hinders threat actors while streamlining user experience.

Read More

NEWS

Handy verification

Passengers travelling on domestic flights in Korea can verify their identities just by holding out a hand, improving convenience and reducing congestion.

Read More

NEWS

Majority of companies not confident about ‘business as usual’ 24 hours after a cybersecurity incident

The clock starts ticking immediately following a cybersecurity incident with the first 24 hours vital in terms of incident response. According to a new social media poll by NTT Security, the specialised security company and centre of excellence in security for NTT Group, the majority (59 per cent) of respondents admit they are not confident their company could resume ‘business as usual’ after the first 24 hours, although 41 per cent say they are.

Read More


NEWS

BlackBerry Cylance delivers first proactive behavioral analytics solution with CylancePERSONA

BlackBerry Cylance has introduced CylancePERSONA, said to be the first proactive, native AI behavioral and biometrics analysis solution for the security industry.

Read More


Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of...
Tripwire, Inc has announced the results of a survey of 215 attendees at the Black Hat USA 2014...
Adapt stands out from the crowd during Cyber Essentials assessment.
Third annual report details how financial CISOs are battling ransomware, wire fraud transfer,...
BAE Systems Applied Intelligence is bringing cloud-based cyber security to commercial organisations...
3rd Annual Global Password Security Report shows widespread password reuse, despite increased...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more