Many data breaches involve some form of compromised credentials and the problem is made worse where accounts have privileged access.
ManageEngine, the enterprise IT division of Zoho, is launching a new product called PAM360, a complete solution to prevent the exploitation of accounts with privileged access.
Wasted technology spend accounts for 30 percent of all IT spending according to the latest State of Tech Spend report from Flexera.
The average IT spend is 8.2 percent of revenue, but larger businesses (with more than 10,000 employees) this rises to 9.3 percent of revenue. 56 percent of respondents expect to increase their spending
Endpoints are generally the part of any network that is most vulnerable to attack, but as the number and diversity of devices expands, defending the endpoint effectively is a major challenge.
Symantec is aiming to make life easier with the launch of Endpoint Security Complete, offering organizations a single solution for protection, detection and response, as well as new attack surface reduction and breach assessment and prevention capabilities.
New research released by AttackIQ based on a study by the Ponemon Institute reveals some worrying trends on the level of accountability for IT security and a lack of confidence in determining the effectiveness of security technologies.
Ponemon surveyed over 570 IT and IT security practitioners in the US and finds 63 percent of survey respondents say their IT security leadership doesn't report to the board on a regular basis, and 40 percent say they don't report to the board at all.
As mobile and cloud computing use increases it creates security, performance, quality and cost issues for organizations.
Akamai is launching enhancements to its Intelligent Edge Platform which will enable businesses to address security, media delivery, and web performance challenges by utilizing distributed workloads and intelligence closest to the digital touchpoint where the user interacts with data and applications.
We all know that standards of privacy and surveillance vary around the world. But which places are best at protecting your privacy?
Research from security testing site Comparitech finds that no single country is consistent in protecting the privacy of its citizens, most are actively monitoring citizens, and only five could be deemed to have 'adequate safeguards'.
Increasing overlap of IT systems with operational technology and industrial control systems poses a range of cybersecurity risks.
Visibility and control specialist Forescout Technologies wants to help organizations uncover and manage these risks with the addition of a new Asset Risk Framework to its its industrial control system security solution SilentDefense.
IBM is reinforcing its commitment to diversity and inclusion in the open source field with the launch of the IBM Open Source Community Grant.
Announced at this week's All Things Open conference in Raleigh, NC, the grant -- which will be awarded quarterly -- will see the winner receive $25k in cash and $25k in Cloud Credits in order to support their efforts dedicated to education and skill building for women, minorities, and/or under-served communities.
More than half the workforce (54 percent) believe they could save five hours or more from tools that automate tasks.
A report from collaboration tool monday.com based on a survey of 1,000 US employees shows over 32 percent would choose to eliminate repetitive administrative tasks if they could improve one thing about work.
Phishing attacks have become commonplace to the point where we almost take them for granted. From the cybercriminal's point of view they are popular because they work.
But what are the origins of phishing and how has it developed? Email security specialist Anavan has put together an infographic looking at the history and future of the threat.
AIOps SaaS platform OpsRamp is launching an updated version that delivers enhancements to its OpsQ event management and intelligent correlation machine learning models.
In addition it introduces new multi-cloud infrastructure monitoring capabilities for Amazon Web Services and Google Cloud Platform, along with new synthetics capabilities to improve digital customer experiences.
Artificial intelligence inspires intrigue, fear and confusion in equal measure. But to thrive in the new era, organizations need to reduce the risks posed by AI and make the most of the opportunities it offers.
This is the conclusion of a new report from the Information Security Forum aimed at helping business and security leaders to better understand what AI is, identify the information risks posed and how to mitigate them, and explore opportunities around using AI in defense.
The Emotet Botnet has started spreading several new spam campaigns again after a three-month break, according to research from Check Point.
Researchers first reported the notorious botnet taking a break in June 2019, but that the infrastructure had become active again in August. Some of the spam campaigns featured emails which contained a link to download a malicious Word file, and some contained the malicious document itself.
Small businesses are frequently a target for attack because they lack the resources to protect their systems as effectively as larger enterprises.
BullGuard is addressing this problem with the launch of Small Office Security which provides robust endpoint protection for desktops, laptops, tablets and smartphones, making it possible to safely on devices in the office, at home, or while hot desking or traveling.
A new survey of 100 business leaders in early stage, UK-based technology companies finds that 73 percent are confident or very confident they will increase their turnover in the coming 12 months.
Although this is seven percent down on the previous quarter, 79 percent say they intend to hire more staff (up six percent) and 66 percent hope to raise investment (up seven percent) according to the latest Tech Tracker report from Studio Graphene.