New US Cybersecurity Framework developed by NIST features COBIT 5 in the core

ISACA’s COBIT 5 is included as an informative reference in the core of the US Cybersecurity Framework, which launched this week and is aimed at helping improve cybersecurity at critical infrastructure operators and other businesses.

Read More



If you want my data, reward me

At the moment we provide our personal details free to data-gathering giants like Facebook and Google, but that won’t always be the case, write Daniel de Bruin and Brad Thiele.

Read More

NetIQ CloudAccess 2.0 securely delivers improved single sign-on experience to SaaS applications

Offers singular IAM process and consistent user experience across enterprise, cloud and mobile devices.

Read More

Technology breakthrough cuts industry’s data recovery time on encrypted hard drives from days to hours

Kroll Ontrack’s “decryption-on-the-fly” technology speeds up data recovery time by taking a targeted approach to recovering encrypted hard drive data.

Read More

During penetration testing performed as an internal attacker, Positive Technologies researchers...
BeyondTrust’s annual Privileged Access Threat Report highlights that greater visibility and...
Centrify doubles down on Zero Trust Privilege, names CFO Tim Steinkopf as CEO; Danny Kibel named as...
Stakeholders at all levels across the organisation can access the true nature of risks and...
Thycotic has expanded its PAM solution to address the risks associated with service account sprawl.
The cyber security expert Stonesoft, A McAfee Group Company, releases version 5.6 of its visionary...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more