Power / Energy
Privileged Access Management / PAM stories
The GDPR and NZ: Why this relationship is so important to the future of data privacy in Aotearoa
In 2018, a new unprecedented data privacy law took the EU and, by association, the rest of the world by storm.
Vulnerability in Cisco security devices could cause firewalls to fail
A vulnerability in Cisco security devices is dangerous for business processes in large companies.
Organisations suffer security incidents related to exposed secrets in DevOps
Fifty-seven percent of organisations have suffered security incidents related to exposed secrets in DevOps, new research has revealed.
High profile attacks, ransomware gangs and weaponisation part of cybersecurity predictions for 2022
The threat landscape is set to evolve at a worrying pace in the year ahead.
Guardicore steps in against ransomware attacks with latest release
Guardicore has released new features to reduce the complexity of segmentation policy creation and enforcement to more effectively secure complex enterprise environments against ransomware attacks.
Yubico promotes from within for new APAC regional vice president role
Geoff Schomburgk will now take the reins and continue to manage A/NZ operations.
Advantage first NZ MSSP to achieve LogRhythm Security Services Authorisation
“It underpins the security services we provide to our customers. We’re excited to have our capability recognised," says Advantage MD.
New study shows IT decision-makers think organisations compromise cybersecurity in favour of other goals
A new study by security firm Trend Micro has revealed that 90% of IT decision-makers believe organisations compromise on cybersecurity in favour of other goals within their business.
Microsoft AD recognised as Leader in Gartner MQ for IAM
Microsoft Identity Program Management corporate vice president Alex Simons says the achievement would not have been possible without its ‘passionate’ customers.
Lack of visibility into user activity increase risk of credential theft and insider threats - CyberArk
Almost half of organisations in the global survey say their visibility into user logs and user activity is limited, which creates ‘blind spots’ for potentially risky behaviour.
Hands-on review: Yubico's YubiKey Bio brings no-nonsense biometrics to 2FA
YubiKey Bio works across platforms including Windows, MacOS, Chrome OS and Linux. We take a look.
ThycoticCentrify builds on vision for modern PAM with latest integration
ThycoticCentrify has leveraged the ThycoticCentrify platform to integrate with Secret Server, its privileged account and session management solution.
Zero Trust means strong, frictionless PAM and other controls
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
Be a “PAMbassador” and help your workmates be cyber smart
Right now, with the threat of ransomware and risks associated with hybrid working top of mind, there is no shortage of ways to put PAMbassadorial skills to good use!
Despite rising security budgets, businesses still paying ransom - report
The way cybercriminals use and manipulate ransomware in an effort to extract money from businesses has changed.
ForgeRock named as Leader in Gartner MQ for Access Management
ForgeRock CEO Fran Rosch says the company is honoured to be named as a leader.
Secure cloud migration with privileged access management
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
One Identity extends identity security platform with OneLogin acquisition
“By adding OneLogin to our portfolio, and incorporating it into our cloud-first Unified Identity Security Platform, we can help customers holistically correlate all identities."
ThycoticCentrify adds features to PAM solution
ThycoticCentrify has announced new features for its privileged access management solution, Thycotic Secret Server.
One Identity hits new milestone with latest PAM solution certification
One Identity has achieved Common Criteria certification by the National Information Association Partnership (NIAP) for its Safeguard for Privileged Passwords 6.7 privileged access management (PAM) solution.
OneLogin solution to enable organisations to adopt Zero Trust principle of least privilege access
“For organisations to adopt a Zero Trust framework, they must embrace the concept of least privilege access."
Thycotic and Centrify named as Leaders in Gartner MQ for Privileged Access Management
According to ThycoticCentrify CEO Art Gilliland, each company’s strengths noted in the report supports the position that the two companies work better together as one.
Video: 10 Minute IT Jams - BeyondTrust on securing critical infrastructure
In Techday's second IT Jam with BeyondTrust, we speak to the company's sales engineer Scott Hesford about critical infrastructure and how best to secure it.
Microsoft partners with Vectra AI on Zero Trust security framework
Vectra AI has announced the Vectra Cognito platform will deliver key Zero Trust capabilities for Microsoft 365 and Microsoft Azure customers.