Almost one-third of cyber security professionals admit to cheating on audits

Over-stretched IT security pros spend more time fire-fighting than doing meaningful security work.

Read More

Gartner identifies security top ten

Gartner has highlighted the top 10 technologies for information security and their implications for security organizations in 2016.

Read More

NEWS

Most organisations not confident in ability to protect data after data breach

69% of IT professionals are not confident their data would be secure if perimeter defenses were breached.

Read More

SailPoint awarded Patent for identity-as-a-service technology

Patented technology maintains ‘zero knowledge’ of administrative credentials in cloud-based identity deployments.

Read More

IAM spending remains buoyant

48 per cent say beating cyber hacking ‘very important’ if digital transformation is to succeed.

Read More

NEWS

Global Cyber Alliance sets out plan to tackle top cyber threats

The Global Cyber Alliance (GCA), a non-profit organisation aimed at tackling the cyber threat set up by the New York County District Attorney, City of London Police and the Center for Internet Security, has identified the top four risks to the online world.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
FireHost has announced trends for the attacks it blocked from its clients’ web applications...
Ping Identity®, The Identity Security Company™, has announced PingOne for Groups. Built...
InteliSecure now protects the critical assets of more than 500 enterprise customers...
According to the results of a study conducted by Kaspersky Lab and B2B International, a DDoS attack...
The 2015 Data Protection Best Practices and Risk Assessment Guides has revealed that in January to...
Adrian Bisaz appointed to build on Corero’s success in defending against DDoS, and malicious...