BLOG

Bad security hinders productivity, Good security enables it

For a long time many have thought of identity security as a necessary burden. All those passwords, all those access denials, all that budget drained away from the profit centres of the enterprise - that's how many business leaders view this aspect of IT instead of recognising its benefits. The truth is quite different. By Saira Guthrie, Senior Product Marketing Manager, Ping Identity.

Read More

BLOG

False dawn: Could the risk of a ransomware attack increase going back to the office?

Slowly but surely, more UK employees are being encouraged back into the office, with the Government keen to accelerate this even further. For many businesses, this will be welcome news, especially those who have struggled to adapt to working from home. By Ian Wood, Senior Director, Head of Technology UK&I, Veritas.

Read More

BLOG

Zero trust – a rose by any other name…

At a recent forum of senior CTOs, CISOs and analysts, several participants expressed a dislike for the term ‘zero trust’. Comments such as the vagueness of the message, the way different vendors use it and the confusion it caused amongst users made some forum members steer away from its branding for both internal and external communication. The group all agreed that the concepts behind zero trust are sound, but many wanted a better way to describe it to their broader organisations. By...

Read More

BLOG

Why organisations need SaaS Protection when moving to cloud services

As the Coronavirus pandemic continues to unfold, organisations across all industries have been forced to adapt and adjust their digital transformation projects to meet the needs of a fast-changing world. Covid-19 has not slowed digitalisation down; on the contrary, it has been a key factor in accelerating such initiatives. Partly driven by the need for flexible and remote working, more and more businesses are migrating their data and business operations to the cloud. By Radhesh Menon, Chief...

Read More

BLOG

How the evolution of tokenization can be utilised to better protect data

Traditionally, methods of data protection have focused on locking up their sensitive information away until it was deprotected to be used. While this may work for data that serves no current purpose, simply locking away the data greatly reduces its value, especially if the risks of loss of business or customer trust greatly outweigh the benefits of securing data. After all, what good is data if you can’t access it. By Trevor Morgan, product manager at comforte AG.

Read More

BLOG

Securing the cloud: how to address new security risks and future-proof operations post-COVID-19

How can organisations overcome today’s cyber security challenges to protect systems and data within and across multiple cloud environments – and underpin new ways of working since COVID-19? By Phil Aitchison, Chief Operating Officer, Big Data & Security UK&I at Atos.

Read More

According to Atlas VPN estimations, damages caused by cybercrime are expected to reach more than...
A third of business still don’t have an emergency response plan in place, despite 78% of...
Thycotic has released the findings from its 2018 Black Hat conducted survey of more than 300...
40% of global respondents reveal they dealt with a cloud breach in the last year.
Nearly three in four employees (72 percent) are willing to share sensitive, confidential or...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more