BLOG

Digital ID - Biometrics are the key to marrying security and convenience

Only biometrics can unify the age-old opposing forces of user-experience and digital security, says Isabelle Moeller, Chief Executive, Biometrics Institute. When it happens, the effect will be remarkable.

Read More


NEWS

Attacks focus on people as well as their technology

Proofpoint has published its annual Human Factor report findings, which detail that cyberattackers are relying more than ever on exploiting people instead of software flaws to install malware, steal credentials/confidential information, and transfer funds.

Read More

NEWS

Employee shortage tops list of barriers to effective threat detection and management

Alert Logic has published the results of a survey conducted amongst 317 security professionals in the UK, Benelux and Nordics, which reveal the latest data points and trends in cybersecurity.

Read More

BLOG

How organizations can block the rise of ransomware

Ixia, a leading provider of network testing, visibility, and security solutions, offers organizations three core principles to develop an appropriate resistance against ransomware.

Read More

NEWS

Gartner says four vectors are transforming the security software market

The security software market is undergoing a dramatic transformation due to four key developments, according to Gartner, Inc. The use of advanced analytics, expanded ecosystems, adoption of software as a service (SaaS) and managed services, and the prospect of punitive regulations are causing enterprises to rethink their security and risk management software requirements and investments.

Read More

Only 18% of British office workers, who use a personal account/device to access work files or...
Sophos has published a multi-part research series on the realities of ransomware, including an...
Global losses from cybercrime now total over $1 trillion, a more than 50 percent increase from 2018.
A new survey of enterprise IT security leaders showed an overwhelming majority--almost 80...
Passengers travelling on domestic flights in Korea can verify their identities just by holding out...
79% of CIOs are concerned that users might ignore IT policies and guidelines, increasing security...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more