How the top PAM-mature enterprises are thwarting privileged credential breaches

  • Energy, technology and finance are the most mature industries when it comes to privileged access management (PAM) adoption and uses, outscoring peer industries by a wide margin
  • 58% of organisations do not use multi-factor authentication (MFA) for privileged administrative access to servers, leaving their IT systems and infrastructure exposed to hacking attempts, including unchallenged privileged access abuse
  • 52% of organisations are using shared accounts for controlling privileged access, increasing the probability of privileged credential...

By Louis Columbus, 18 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Security.

SentinelOne raises $120 million in Series D funding to automate enterprise endpoint security

California-based endpoint security software provider SentinelOne has raised $120 million (£94m) in a recently conducted Series D round led by Insight Partners.

Samsung Venture Investment Corporation, Third Point Ventures, Redpoint Ventures, NextEquity, Data Collective, and other firms also participated in the funding round.

SentinelOne offers security services to companies...

By Enterprise CIO, 07 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

New research shows extent of ‘polymorphic’ email phishing campaigns

We’re deluged by emails on a daily basis; many of which are not in good faith. Many others, like the old-fashioned telephone game, are passed down from scammer to scammer, changed a little here, and then sent to users’ inboxes.

According to new research from phishing prevention provider Ironscales, more than two in five (42%) email phishing attacks are polymorphic, with some attacks undergoing more than 500...

By James Bourne, 05 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Employee Education, Employees, Security.

Does your organisation need a chatbot or a digital agent? Three important distinctions

Conventional ITSM solutions are finding it difficult to cope up with today’s business needs. Complex public, private and hybrid cloud infrastructures add hundreds of thousands of endpoints to the network, and they all must be managed. More is being demanded of IT professionals at the same time that IT talent is hard to find. Organisations are in search of new ways to provide excellent customer service and meet their service level agreements (SLAs).

AI is being touted as the answer for many of...

By Dr. Akhil Sahai, 21 May 2019, 0 comments. Categories: Applications, Employees, Productivity, Security.

How to secure mobile devices in a Zero Trust world: A guide

  • 86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types
  • 48% say they’ve sacrificed security to “get the job done” up from 32% last year
  • 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were “difficult and expensive"

Bottom line: The majority of enterprises, 67%, are the least confident in the security of their mobile assets than any other device or platform today according to 

By Louis Columbus, 20 May 2019, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Employees, Security.

The big enterprise security problem posed by small – or at least smaller – businesses

As the threat level grows and diversifies, global enterprises continue to make cybersecurity a top priority. As they should: high-profile attacks continue to wreak havoc on major brands—with Humana and Marriott among the most notable recent victims. One silver lining in the continued fight is that the pervasiveness of threats has elevated cybersecurity from an IT problem to a board-level issue.

In fact, according to

MobileIron aims to kill off the password completely with further move to Zero Trust

Enterprise mobile software provider MobileIron has announced an update to its Access mobile security and identity platform with a zero sign-on solution which aims to finally replace the password as a security authenticator.

The company’s vision is to enable enterprises to use their mobile devices as their digital identity to access enterprise services and data, built on its unified endpoint management (UEM) platform and powered by...

By James Bourne, 08 May 2019, 0 comments. Categories: CIO, Employees, Enterprise Mobility, Privacy, Security.

Why you need to be able to trust your SD-WAN platform

Imagine a scenario when an IT network manager settles into the task of remotely provisioning and configuring an SD-WAN edge router that’s located in a distant branch office. The router appliance was shipped from a supplier’s warehouse to the branch, unboxed, and plugged into power and Ethernet by a local non-technical employee.

Before this new connection to the corporate WAN can be...

By Anand Oswal, 17 April 2019, 0 comments. Categories: Applications, Case Studies, Data & Analytics, Development, Security.

It’s not me, but it is probably you: How IT still views employees with contempt on cybersecurity

A new report from software as a service (SaaS) operations management and security platform BetterCloud begins with a blunt message. “While cybercriminals, hacktivists and ransomware often make a big splash in the news headlines, the reality is that the biggest security threat is often right in front of you.”

According to the study, which featured survey data from 500 IT professionals, the ‘well-meaning but...

By James Bourne, 03 April 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Security.