SGN relies on CA Technologies

Leading UK gas distribution company enhances protection across its cloud infrastructure with CA Privileged Access Management.

Read More

Beware the insider threat

Organisations report that 42% of IT security incidents occur as a result of their employees actions, and 74% originate from their extended enterprise (employees, customers, suppliers).

Read More

Identity theft and poor internal security practices take a toll

164% increase in stolen, lost or compromised records.

Read More

Strong cyber security helps business success

A new cyber security report from Vodafone, Cyber Security: The Innovation Accelerator, highlights a strong link between how cyber security is used and business success, with 86 per cent of high-growth companies1 seeing information security as an enabler of new business opportunities, rather than simply a means of defence.

Read More

The deadly sins that add to security woes

Despite prioritizing privileged access management, a majority of enterprises fail to prevent the abuse or misuse of privileged credentials.

Read More

NEWS

BYOD is the biggest blind spot

Least effective security measures are password-protected documents, facial recognition, and access controls.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Majority believe human error could cause exposure of cloud data, indicating need for more...
Beyond Identity selects Ignition Technology to drive channel expansion in the Nordics and Benelux.
Intel Security has released its McAfee Labs Threats Report: February 2015, including assessments of...
Half of first-time security analysts working in Security Operations Centres (SOCs) plan to leave...
57% of organizations are prioritizing secure cloud migrations and 48% are looking to implement Zero...
Seamlessly extending security, compliance, and governance to cloud use.