Logo
NEWS

Social engineering leads the list of most popular hacking methods

The recent data breach of 10,000+ Departments of Justice and Homeland Security staff and over 20,000 supposed Federal Bureau of Investigation (FBI) employees is another example that becoming an insider by using social engineering tactics is much easier for hackers than writing zero-day exploits.

Read More

IT professionals overconfident in cyber attack detection

Industry leader evaluates confidence in seven key security controls required to detect cyber attacks on endpoints.

Read More

NEWS

Cybersecurity pros face increased pressures

Trustwave has released the 2016 Security Pressures Report, based on a survey of 1,414 in-house information security professionals, which shows a rise in both the current and expected pressures in the career field and offers ways for security professionals globally to mitigate the increasing tensions.

Read More

Eliminating security silos

Company delivers new product capabilities to boost enterprise worker productivity via secure access to corporate data and applications.

Read More

Thycotic names Simon Azzopardi Vice President of EMEA

Thycotic, a provider of privileged account management (PAM) solutions for more than 3,500 organizations worldwide, has appointed Simon Azzopardi to Vice President of EMEA. In this role, Azzopardi will be responsible for building a world-class two-tier channel focused on delivering an unparalleled level of service to Thycotic customers. Azzopardi will also be tasked with expanding Thycotics’s presence in the EMEA region and facilitating the growth of the company into new,...

Read More

NEWS

Skyhigh Networks and Check Point partner

Seamlessly extending security, compliance, and governance to cloud use.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Intercity Technology study reveals that on average, IT users feel that IT departments are 21 months...
CyberArk has unveiled new just-in-time access capabilities that help reduce risk and improve...
41% of IT leaders say content sprawl is increasing the risk of data breaches and leaks.
McAfee Labs has released the McAfee Labs Threats Report: August 2014, revealing that phishing...
Ni Cybersecurity brings world-leading Cyberbit Range platform to Japan to address the growing...
Shared service model improves security and accessibility while dramatically reducing licencing...