NEWS

Weak passwords cause ransomware woes

As one of the leading types of cyber-attacks, ransomware is expected to dominate cybercrime in 2020. According to PreciseSecurity.com research, weak passwords were one of the most common cybersecurity vulnerabilities in 2019, causing 30% of ransomware infections in 2019.

Read More

NEWS

CyberArk expands just-in-time capabilities

CyberArk has unveiled new just-in-time access capabilities that help reduce risk and improve operational efficiency as organizations implement broader least privilege strategies. By extending just-in-time support with the ability to remove unnecessary standing access to Linux systems, CyberArk remains the only privileged access management vendor to provide comprehensive just-in-time offerings across cloud and hybrid environments and on the endpoint.

Read More

NEWS

Organisations fail to protect keys and certificates

Only 54% of security professionals admit to having a written policy on length and randomness for keys for machine identities.

Read More



NEWS

PAM for DevOps

BeyondTrust’s centralised secrets administration solution strengthens credential protection in DevOps environments.

Read More

A third of business still don’t have an emergency response plan in place, despite 78% of...
The latest edition of Kaspersky’s annual IT Security Economics report reveals the growing...
Fortinet has closed the acquisition of Meru Networks. With the close of this acquisition, Fortinet...
Venafi has released the results of its 2015 RSA Conference survey, gathered from nearly 850 IT...
UK SME’s are at risk of 65,000 cyber security attacks daily – with around 4,500 of these being...
Knowledge-based identification may be the preferred way to authenticate online, but for how...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more