NEWS

'Enterprising' criminals are selling direct access to cloud accounts

Lacework, the data-driven security platform for the cloud, has released its quarterly cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses.

Read More

NEWS

Password recycling risk

62% of employees reuse passwords across business and personal accounts, with 70% of leaders concerned about the issue.

Read More

NEWS

Beyond Identity and Ignition Technology form strategic distribution partnership

Beyond Identity selects Ignition Technology to drive channel expansion in the Nordics and Benelux.

Read More

NEWS

Organisations trust Zero Trust

Despite staggering interest, a top barrier to implementing Zero Trust strategies is, surprisingly, concern over employees feeling trusted by their employer.

Read More


VIDEO

Alliance seeks to standardise Extended Detection + Response

DW talks to Gorka Sadowski, Chief Strategy Officer at Exabeam, about the recent launch of the XDR Alliance, which aims to bring together competitive and complementary vendors to work together on some common cybersecurity objectives, with end users the main beneficiaries.

Read More

Trend Micro intercepted a surge in malware, phishing and credential theft.
Respondents expect their transition to the cloud, as part of an organization’s digital...
38% of the 2019 Fortune 500 do not have a chief information security officer (CISO).
Seventy-two percent believe nation-states have right to ‘hack back’ cybercriminals.
Record numbers of job seekers expected to lose sight of who holds their personal information.
Knowledge-based identification may be the preferred way to authenticate online, but for how...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more