<
>

Posts in Identity & Access

Cybersecurity Trends Forecast for 2022 and Beyond by BeyondTrust

BeyondTrust, the worldwide leader in Privileged Access Management (PAM), released its annual forecast of cybersecurity trends emerging for the New Year and beyond. These projections,...

In the Era of Ransomware, Robust Data Management Is Key

Ransomware is the new data breach. Nowadays, cybercriminals are no longer content just exfiltrating data and either leaking it on the dark web or selling it to the highest bidder. Instead, they...

ESET Launches New Platform for Home Protection

Global cybersecurity leader ESET launched a new version of its consumer security lineup along with ESET HOME, a platform that allows users to manage the security of all their Windows and Android home...

Hackers Imitate Social Media Brands in Phishing Attempts

Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd., a leading provider of cyber security solutions globally, has published its new Brand Phishing...

Are APIs your Weakest Security Link?

Authored By: Tim Mackey, principal security strategist, Synopsys Cybersecurity Research Center Best practices reveal how to shore up the connective tissue of a website An application...

APAC Businesses Threatened by Rise in RCE Attacks

Businesses in Asia-Pacific could unwittingly allow hackers to gain access and control their computer systems remotely, if they don’t take steps to resolve remote code execution (RCE) bugs...

Scammers Are Winning: Law enforcement worldwide received 266 million reports from scam victims, up from 139 the year before

In ScamAdviser's 3rd Global State of Scams Report, 42 countries were analysed on the number of people scammed and the amount of money lost. Number of Scams...

CrowdStrike Joins Forces with SaaS, Cloud and Security Leaders to Set the Standard for XDR Through New CrowdXDR Alliance

CrowdStrike Inc., a leader in cloud-delivered endpoint and workload protection, today announced the CrowdXDR Alliance, a unified and open Extended Detection and Response (XDR) coalition formed with...

Tenable Feature Video Thailand

Suwitcha Musijaral and Sutee Assawasoontarangkoon from Tenable explains the key concerns for organisations in securing their business and how does Tenable help businesses with...

Zero-Trust for Privacy Explained

A zero-trust approach is a cybersecurity framework or, model wherein all users, applications, devices, networks and processes are assumed to be potential attack vectors and are thus not granted...

Pages

Subscribe to RSS - Identity & Access