Difference between knowing about access risk and ability to fix it

97% aware of risk created by misused or stolen credentials, but only 29% confident of organisation’s ability to detect improper access.

Read More

British companies at risk of becoming cyber-dominoes

New research from Radware shows a fifth of companies are now under constant attack.

Read More

BalaBit’s Shell Control Box is verified as Citrix Ready with Citrix XenApp and XenDesktop 7.x

Shell Control Box becomes a Citrix Ready verified PIM tool for Citrix 7.6 platforms.

Read More

Next-generation firewalls must evolve to remain relevant

By Sean Newman, security strategist, Cisco Security Business Group.

Read More

IT lacks efficiency

TeamQuest has announced the results of their Global IT Management survey with indicators on how IT processes are maturing in corporations around the globe. Over four hundred IT professionals from 10 countries participated in the study conducted by Kelton Research.

Read More

Delivering key privileged access controls for ISO/IEC standards

New whitepaper guides organisations to address ISO/IEC 27002 security controls with the CyberArk solution.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more
Advancements block more threats, detect new threats faster, automate response and reduce...
Trend Micro has released new research detailing the murky cybercrime supply chain behind much of...
Wipro has launched its first ‘State of Cybersecurity Report, 2017’ which highlights the...
Human error is the top cause of serious breaches but malicious attacks are IT leaders’ biggest...
Half of IT leaders say that future remote or hybrid work will make it harder to prevent phishing...