<
>

Posts in Identity & Access

ESET Research Uncovers Latest Version of Gelsemium: Cyberespionage Against Government and Other Targets in Asia

Since mid-2020, ESET Research has been analysing multiple campaigns, later attributed to the Gelsemium cyberespionage group, and has tracked down the earliest version of their main malware,...

WatchGuard Unveils New Endpoint Security Product Family Within WatchGuard Cloud, Just One Year After Panda Acquisition

WatchGuard Technologies, a global leader in network security and intelligence, multi-factor authentication (MFA), advanced endpoint protection, and secure Wi-Fi, announced that it has integrated the...

CyberArk Advances Industry-Leading Identity Security Platform

CyberArk, the global leader in Identity Security, announced major advancements to the CyberArk Identity Security Platform to help secure high-risk access and broaden protection across cloud and...

How Secure Authentication and Authorisation is More Than Identity Management

Authored by: Peter Löfling, General Manager APAC, Varnish Software Authentication and authorisation policies exist in companies of all types and sizes to govern access control and who can...

The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage

IntSights, the threat intelligence company focused on enabling enterprises to Defend Forward, released a research around The Evolving Ransomware Threat: What Business Leaders Should...

EfficientIP and IDC: Threat Actors Diversify Their Toolkits Throughout Pandemic with DNS Attacks Costing Nearly US$1 Million Each

EfficientIP, a leading provider of network security and automation solutions specialising in DDI (DNS-DHCP-IPAM), announced the results of its 2021 Global DNS Threat Report. The annual research,...

The WhatsApp Effect - How Users Can Protect Themselves In The Rising Tide Of Intrusive Mobile Apps

Last January, Facebook-owned instant messaging app WhatsApp announced that it would be updating its privacy policy to allow the collection of additional information and metadata of its users....

ExtraHop Director of Systems Engineering Explains How Businesses Should Secure the Supply Chain to Avoid Data Leakage

A supply chain attack is a particular type of cyber attack that seeks to gain access to protected information or damage an organisation by targeting less-secure elements in the supply chain, such as...

Eliminate Ransomware and Data Loss with the New Veeam Backup and Replication v11 Webinar

Your data is critical to keep your business running. With workloads accelerating to multi-cloud ecosystems, you need a single, robust solution that is powerful and flexible enough to protect all...

Building A Modern SOC - Empowering SecOps Teams To Keep Pace With Cyber Threats

The Security Operations Centre (SOC) was established to help companies detect, monitor, and respond to cyber threats. However, as attack volumes have surged and threats have grown more sophisticated...

Pages

Subscribe to RSS - Identity & Access