Cloud security is not where it needs it be, and cyber-criminals know this better than anyone.
The cloud itself encompasses a wide range of systems and services, and a single security team can often be responsible for securing workloads across AWS and Azure, email communications in Office 365, customer data in...
An emerging technology, Vvendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.
As businesses constantly evolve and grow, so does an organisation's attack surface. The pace and velocity of technology transformation in enterprises has created a difficult environment for security teams to defend against threats.
View this webinar now OnDemand and learn how:
Organisations need to adapt to...
Multi-cloud adoption brings a host of benefits and agility for SMBs. At the same time, the following questions emerge:
Can you centralise access to multi-cloud services that are used on-demand but discarded when no longer needed?
How do you ensure subcontractors get the right level of privilege for the task at...
Time for a fresh edition of "learn from how others get breached" focusing on Equifax. The goal is not blame, but rather to highlight specific missteps so others can avoid making the same mistakes. The Equifax breach offers a plethora of takeaways to help organizations better repel attackers.
Cloud maturity and confidence are growing, but security leaders are still reluctant to host highly sensitive data in the cloud. These are findings of a new Barracuda Networks survey. Chris Hill and Gemma Allen of Barracuda explore the results and what they mean.
Running this survey for the second consecutive year,...
Emotet malware alert: The U.S. Cybersecurity and Infrastructure Security Agency says it's been "tracking a spike" in targeted Emotet malware attacks. It urges all organizations to immediately put in place defenses to not just avoid infection, but also detect lateral movement in their networks by hackers.
Corporate security teams spend a large amount of their time and resources attempting to secure
their systems from outside cyberthreats - that is, from hackers who are external to the corporate
network. According to Verizon's 2019 Data Breach Investigations Report, almost 70% of confirmed
data breaches are...
Cyberattacks and data breaches cost the global
economy trillions of dollars annually, with some
forecasts estimating as much as $6 trillion annually by
To truly slow hackers down -- and to prevent
as much damage as possible before it ever happens
-- a more proactive approach to security is...
The Buyer's Guide for Complete Privileged Access Management (PAM) is the most thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. This detailed PAM Buyer's Guide will help you identify where to begin your privileged access management...
Expectations of online businesses have never been higher. Customers expect personalised experiences and high platform security, while demanding more streamlined registration processes. And if they don't get them, they'll take their business elsewhere.
Resultantly, businesses are experiencing a profound tension. How...
Ahead of the release of Edward Snowden's memoirs chronicling his decision to bring illegal "big data" domestic U.S. surveillance programs to light, a former NSA intelligence specialist points out that the U.S. still lacks a whistleblowing law to protect intelligence workers who spot illegal activity.
IT and security professionals are juggling more responsibilities than ever before. Whether it's network maintenance or managing and securing employee identities - maximizing security and productivity with IAM solutions is essential. Especially when organizations may not have the resources they need.