BLOG

When Identity Meets Data: A Solution for Unstructured Data

Today’s business world is driven by data, enabling employees, contractors, partners and vendors to communicate. But if this data is not protected, an organisation’s reputation and finances can be damaged. Some of this data – like financials and personally identifiable information (PII) – is priceless and requires special handling to mitigate the risk of data breaches. By Paul Trulove, CPO at SailPoint.

Read More

VIDEO

The paradigm shift of IT industry from product to services and what it means for security

According to Veniamin Levtsov, VP, Corporate Business, we’re witnessing the beginning of an era of manages service providers. In this episode of Business Matters we discuss the major paradigm shift in IT industry and what it means for IT Security that is relying more and more on such services as Threat Intelligence.

Read More

NEWS

Organisations fail to protect keys and certificates

Only 54% of security professionals admit to having a written policy on length and randomness for keys for machine identities.

Read More



NEWS

PAM for DevOps

BeyondTrust’s centralised secrets administration solution strengthens credential protection in DevOps environments.

Read More

McAfee has released its McAfee COVID-19 Threat Report: July 2020 examining cybercriminal activity...
Despite the perception they are too small to target, SMBs are increasingly vulnerable due to...
The Q3 2021 report revealed a 4.5% increase in CVEs associated with ransomware and a 3.4% increase...
The joint offering combines the expertise in Identity and Governance Administration from Omada with...
Conducted by the Ponemon Institute, the 16th annual study highlights that half of organizations...
Tanium study finds that organisations can save money as they grapple with issues such as mass...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more