LastPass by LogMeIn has released findings of a new report conducted in partnership with Vanson Bourne to understand how IT and security professionals across a variety of industries including finance, IT and media are managing their identity and access management (IAM) programmes. The findings reveal that IAM priorities differ by industry vertical, emphasising how a one-size-fits-all approach to IAM doesn’t work when every industry and business within that industry is unique.
Read MoreDW talks to Adrian Moir, Sr. Consultant, Product Management & Lead Technology Evangelist, Quest Software, about the launch of its latest solution, NetVault 13, designed to help customers simply data protection and improve their recovery footprint.
Read MoreZscaler has acquired Edgewise Networks, a pioneer in securing application-to-application communications for public clouds and data centres. Edgewise Networks significantly improves the security of east-west communication by verifying the identity of application software, services and processes to achieve a zero trust environment which measurably reduces the attack surface and lowers the risk of application compromise and data breaches.
Read MoreThe COVID-19 pandemic has forced businesses into operating under a “new norm” where the working from home (WFH) model has quickly become the recommended and preferred approach. Indeed, the COVID-19 pandemic is forcing organizations to transform how they conduct business, albeit in a very rapid way. By Shehzad Merchant, Chief Technology Officer at Gigamon.
Read MoreQuantum is coming as a powerful challenge to cryptography and all of the information modern encryption keeps safe. Many understand that but view it as a distant threat. What they don’t realise is how far they’ll have to go to prepare for it. By Tim Hollebeek, Industry and Standards Technical Strategist, DigiCert.
Read MoreThe concept of a Zero Trust Networking is gaining in popularity. However, many organisations still think of security as protecting the perimeter – complete with layered security technologies resembling the layers of an onion. However, moving from a legacy position to a more progressive approach to cyber security need not be a big-bang project. Instead, some organisations are embarking on more manageable phased transitions that move over key functions with little disruption and with...
Read More