NEWS

Training, early detection and verification are essential to increasing trust in employees

ObserveIT has published findings from a global survey of 600 IT leaders across various industries, which revealed that organisations want to trust their employees when it comes to cybersecurity, but to do so, they need to better leverage technology. The research also found that employers should develop clear cybersecurity protocols and invest more in employee training programmes and monitoring tools to verify safe user activity.

Read More

NEWS

NatWest first UK bank to unveil biometric card

200 customers selected to take part in pilot.

Read More

NEWS

Employees accessing cloud-based applications and data via mobile devices

Zscaler report provides insights into user behaviour and the challenges with mobility and remote access in the face of cloud transformation.

Read More

NEWS

Historic vulnerabilities and network complexity pose ongoing security risks

Keysight has published the third annual Security Report from Ixia, its cybersecurity and visibility business. The 2019 report analyzes the biggest security findings over the past year from Ixia’s Application and Threat Intelligence (ATI) Research Center resulting from historic unpatched vulnerabilities, along with growing network and application complexity.

Read More

BLOG

HR: The new central source of truth for business IT

Businesses the world over are facing ever increasing pressure to adapt and evolve their IT strategies to keep pace with technology to attract and maintain a productive, talented and happy workforce. However, it’s not just as simple as starting a fresh IT strategy, particularly as many businesses at an enterprise level have decades of legacy IT to contend with. By Dan Power, UK regional manager at OneLogin.

Read More

NEWS

MHR secures privileged access for company and clients

Thycotic says that talent management, HR payroll and people analytics solutions company MHR, has selected its Secret Server solution to manage and maintain access to its privileged accounts and associated passwords. MHR is also using Thycotic’s Secret Server to protect customers using its solutions as part of a hosted service.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Survey conducted on site at the 2019 RSA Conference indicates widespread challenges and negligence...
Passwords and two-factor authentication are going to decrease as organisations adopt modern...
More than 300 executives surveyed to determine the frequency and severity of people-centric data...
Both technical teams and general staff need more frequent guidance on recognising and dealing with...
Majority believe human error could cause exposure of cloud data, indicating need for more...
As cloud transformation accelerates, ThycoticCentrify’s cloud provider solution for AWS provides...