NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber attacks on endpoints.

Read More

NEWS

Cybersecurity pros face increased pressures

Trustwave has released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing tensions.

Read More

Eliminating security silos

Company delivers new product capabilities to boost enterprise worker productivity via secure access to corporate data and applications.

Read More

Thycotic names Simon Azzopardi Vice President of EMEA

Thycotic, a provider of privileged account management (PAM) solutions for more than 3,500 organizations worldwide, has appointed Simon Azzopardi to Vice President of EMEA. In this role, Azzopardi will be responsible for building a world-class two-tier channel focused on delivering an unparalleled level of service to Thycotic customers. Azzopardi will also be tasked with expanding Thycotics’s presence in the EMEA region and facilitating the growth of the company into new,...

Read More

NEWS

Skyhigh Networks and Check Point partner

Seamlessly extending security, compliance, and governance to cloud use.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Courion asks: how secure are your service accounts? Most don’t realise the number of service...
Dell’s end-to-end Connected Security approach ensures both outside-in and inside-out...
Security concerns intensify with challenges over remote worker access.
Lookout has introduced what it says is the industry’s first Zero Trust access solution that...
Dell advocates the use of secure enterprise workspaces in BYOD environments to help organisations...
Security and privacy concerns plague 77% of IT leadership when building and implementing mobility...