Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account management and vulnerability management leader

Read More


FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of Security Manager 8.0. Leveraging highly automated analysis and monitoring of security infrastructure, Security Manager 8.0 delivers previously unavailable capabilities to identify and resolve emerging gaps in network defence.

Read More

Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first cloud-based identity management solution that addresses today’s growing gap in security, visibility and control over privileged accounts. Centrify executives are currently conducting briefings on CPS at RSA, taking place now at San Francisco’s Moscone Center, in booth 415.

Read More

AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to support more organizations in staying ahead of emerging attacks. As part of the effort, HP intends to integrate data from AlienVault Open Threat Exchange (OTX) into HP Threat Central, its cloud-based threat intelligence sharing and analysis platform. 

Read More

Security, reliability and customer service matter most

Managed services providers (MSPs) are more focused than ever on managing endpoints and using remote monitoring and management (RMM) solutions to increase visibility and scale to meet the ongoing demands of managing cloud-based solutions, according to a new Autotask survey of MSPs.

Read More

Bringing together core identity use cases in one centralised experience, Okta’s unified platform...
CISOs are motivated by being the ‘business bodyguard’ despite growing pressures on the job, new...
Security professionals anticipate automation will reduce IT security headcount, but not replace...
Hidden Data Economy report exposes price points for stolen data bought and sold in cybercriminal...
Business email compromise (BEC) and ransomware attacks prove most costly phishing threats to large...
Convergence between physical and cyber environments is leaving businesses exposed.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more