As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?
The...
Remote access provider Splashtop has bought server and network access management vendor Foxpass to get better visibility across co-managed and multi-tenant environments. The acquisition of Foxpass will simplify the onboarding experience for developers while ensuring passwords aren't being shared.
Analyzing Identity Risks (AIR) 2022 is a statistical analysis of every Identity Risk Assessment that Illusive conducted during 2021 and includes real-world examples of how these identity risks manifest.
Discover the growing use of identity-based attack tactics in ransomware and other cyberattacks and also what you...
Okta Identity Governance has enjoyed success in its first quarter of global availability as businesses unify access management and governance. Okta is surprised by the amount of traction its governance offering has gained with large enterprises and in competitive bake-offs, says CEO Todd McKinnon.
Fraud is a growing industry globally. According to research from Technology Research Institute, businesses are seeing more than 50% of their new user accounts with false or incorrect data and an increase in fraud losses over the past 12 months.
Part of the reasons is because many businesses in Asia Pacific...
CyberArk will promote Matt Cohen, 47, to CEO on April 3. Cohen, who is credited with optimizing CyberArk's go-to-market organization and leading its transition to a subscription business model, will replace Udi Mokady, 54, who co-founded CyberArk in 1999 and has served as its CEO since 2005.
Today’s evolving cyber-risk environment requires an ‘assume breach’ mindset.
Chief Information Security Officers (CISOs) know it. So do regulators, IT Security auditors, boards and cyber insurance providers, who are increasingly mandating adoption of Zero Trust cybersecurity principles.
Join CyberArk for...
Okta will execute the third-largest round of layoffs of any cybersecurity company in the current economic downturn, axing 300 workers following customer identity execution challenges. The identity giant plans to reduce its staff by 5% in a push to reduce operating expenses and improve profitability.
Privileged access management vendor Delinea has hired longtime RSA sales leader David Castignola to expand beyond North America as well as in nonregulated industries. Delinea hopes to increase sales beyond verticals such as financial services, banking, healthcare, insurance and the public sector.
Simeio has added SailPoint and IBM to its identity and access management line card through the purchase of identity services provider PathMaker Group. The first acquisition in its 17-year history will give Simeio access to senior-level personnel with deep knowledge in identity governance.
Global infrastructure services company Encora needed to secure the crown jewel systems and endpoints of its 7,300-strong workforce. The firm had to assure its Fortune 500 clients that their data was safe. Here's how a privileged access management solution and zero trust framework helped.
Okta has stemmed employee attrition and accelerated customer identity sales by clarifying product function but now has to grapple with longer sales cycles for small to midsized businesses. Okta says efforts to reposition its customer identity offering over the past quarter have borne fruit.
Japanese conglomerate Hitachi has sold its small identity-as-a-service practice to Canadian software specialist Volaris Group to drive better execution around core products. The firm found it was easy to get lost within Hitachi given the conglomerate's size and focus on electronics and engineering.
Vikas Malhotra, country manager, LastPass, discusses establishing a password management program as the first line of defense in establishing user identity, followed by 2FA and MFA as the second step in the protection process.
Today's big challenge for practitioners is identifying the "known and unknown" attack surface faster than the hackers. There is a need to build purpose-built sensors and asset management strategies to discover unknown attacks, says Debashish Jyotiprakash, vice president - Asia at Qualys.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.