Dell releases privileged access suite for Unix

At RSA Conference 2013 in San Francisco, Dell announced the release of Quest One Privileged Access Suite for Unix, which combines Active Directory bridge and root delegation …

Hidden security threats on enterprise networks

Check Point uncovered the major security risks and threats that impact organizations worldwide. Their new report examines the leading security threats, the risky web …

Cyber-Ark secures privileged accounts

Cyber-Ark Software announced its Privileged Identity Management Suite for Critical Infrastructure Protection (PIM/CIP), which secures critical infrastructure by preventing the …

Most effective ways to stop insider threat

Imperva examined the psychological, legal and technological tactics employed by leading organizations to mitigate insider threats, a class of enterprise risk perpetuated by a …

Verdasys launches Digital Guardian 6.1

Verdasys announced Digital Guardian 6.1, an information protection platform that integrates compliance, insider threat prevention and cyber threat prevention. The release also …

Insider threat in financial services sector

When it comes to preventing insider fraud, financial organizations would do well to more closely monitor experienced, mid-level employees with years on the job, according to a …

Online file sharing poses great security risks

As online file sharing becomes increasingly common as a business practice, SMBs are more at risk than ever before, according to Symantec. A new survey revealed that SMB …

Insider threat as prime security concern

Cyber-Ark Software revealed the findings of its annual “Trust, Security and Passwords” report. Whilst the research reveals a growing awareness of external threats …

It’s official, corporate passwords are cheap

Nearly 50 per cent of employees would readily sell their corporate passwords for less than £5, according to Ping Identity. 30% would do the deed for even less, happily …

Real-time session monitoring by Cyber-Ark

Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity. With the recent release of its Privileged …