Tuesday, 21st January 2020
BLOG

The Magnificent Seven: How to modernise your security operations

The main issues we see arise with cybersecurity strategies seem to link to efforts that arise when businesses look to modernise these operations – they have too few people, too many security tools and too little insight on where the attacks are coming from and how they are be carried out. By Simon Church, General Manager and Executive Vice President, Europe at Optiv.

Read More

BLOG

How unguarded privileged access can turn a breach into a catastrophe

It has become increasingly accepted by many organisations that a security breach, in some form or another, is unavoidable. Even the most robust and cutting-edge security defences can potentially be thwarted by a dedicated adversary armed with new attack techniques. From the downtime to the cost of the clear-up, the impact can be devastating: in fact, a 2017 study by Ponemon estimated that the average data breach carried a total cost of $3.62m. By Joseph Carson, Chief Security Scientist at Thyc...

Read More

BLOG

A flexible approach to privacy

The ongoing impact of GDPR, by Dan Harding, Director, Sign In App.

Read More

Is it time for a cyber hygiene check-up?

By Katie Curtin-Mestre, VP of Product and Content Marketing, CyberArk.

Read More

Iron Rain: What Defines a Cyber Insurgency?

By Tom Kellermann, Chief Cybersecurity Officer, and Rick McElroy, Security Strategist at Carbon Black.

Read More

Tackling poor password hygiene habits head-on

Alvaro Hoyos, Chief Information Security Officer at OneLogin.

Read More

Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more