Centrify
Centrify spins out IDaaS business as Idaptive
Centrify is spinning out its IDaaS business as a standalone company named Idaptive. Centrify is sharpening its focus on redefining the legacy approach to Privileged Access …
Adopting a Zero Trust approach is the best strategy to control access
A new study conducted by Forrester Consulting found that organizations powering Zero Trust Security with next-gen access solutions reported twice the confidence to accelerate …
26,000 electronic devices are lost on London Transport in one year
Commuters lost over 26,000 electronic devices on London’s Transport for London (TFL) network last year, new research from the think tank Parliament Street has revealed. The …
Unrestricted access to systems and files exposes organizations to cybercrime
UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five …
Dixons Carphone breach: Personal and payment card info compromised
Dixons Carphone, the multinational electrical and telecommunications retailer that holds over 2,000 stores across the UK, Ireland and mainland Europe, has suffered a security …
Centrify extends Zero Trust security ecosystem
Centrify announced it is extending the Zero Trust ecosystem with new partners and a new partner program, the Centrify Zero Trust Security Network. The expanded program, …
Zero Trust Security: Never trust, always verify
Zero Trust Security assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. In this …
Would you delete your account if a social media provider misused your data?
With the Facebook scandal involving Cambridge Analytica still fresh in people’s minds, two-thirds of professionals admit they would delete their account if a social media …
Poor communication between CEOs and technical officers leads to misalignment
A misalignment between CEOs and technical officers is weakening enterprise cybersecurity postures, according to Centrify. CEOs are incorrectly focused on malware, creating …
Lack of proper security solutions is annihilating companies’ reputations
Businesses are not meeting consumer expectations around protecting personal information, according to a study conducted by the Ponemon institute across the U.S., U.K., Germany …
7 tips to reduce risks of data breaches
A recent study conducted by Forrester Consulting found that two-thirds of organizations have been breached five times in the past two years. It’s clear that traditional …
Bored employees seen as biggest potential data security risk
Employees who become distracted at work are more likely to be the cause of human error and a potential security risk, according to a snapshot poll conducted by Centrify at …
Featured news
Sponsored
Don't miss
- EU adopts Cyber Resilience Act to secure connected products
- DORA regulation’s nuts and bolts
- Unlocking the power of cryptographic agility in a quantum world
- Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)
- Internet Archive data breach, defacement, and DDoS: Users’ data compromised