Is Cloud Application Control the silver lining that any next generation web security solution needs?
The proliferation of Bring Your Own Device (BYOD) within the modern business environment was as much a matter of timing as anything else. The growth in employee owned devices dovetailed with the global financial crisis. Businesses looking to reduce their overall capex costs therefore encouraged the trend as the cost of purchase, replacement and general […]
Centrify Launches Industry’s First Cloud-based Privileged Identity Service to Shield Corporations from Core Security Breaches
Centrify Privilege Service Addresses Today’s Hybrid IT Environments of On-Premises and Cloud-based Systems as the Most Comprehensive Privileged Identity Solution on the Market Centrify Corporation, the leader in unified identity management across cloud, mobile and data center, announced the launch of Centrify Privilege Service (CPS), the industry’s first cloud-based identity management solution that addresses today’s […]
Recently, Obama issued an executive order that places economic sanctions on individuals or group cyber attackers that aim to threaten US national security or economic activity. The order comes on the heels of a momentous year for malicious cyber crime—A report by PricewaterhouseCoopers found that the number of detected cyber attacks skyrocketed in 2014—up 48% […]
Márton Illé, security evangelist for BalaBit IT Security, reviewed the new 2015 Verizon Data Breach Investigations Report and made the following observations. Márton Illé, security evangelist, BalaBit IT Security: The annual Verizon Data Breach Investigations Report is out and it is worth giving it a go to learn from the lessons of our unlucky fellows in 2014. […]
CIO’s today are faced with a dilemma. On one hand more and more data is moving to the cloud. Increasing numbers of corporate users are demanding better ways to access, store, manage and share their data with others across multiple devices. But on the other hand, public cloud services like Dropbox that make this possible […]