News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Zero Trust principles: More security in the cloud
Zero Trust principles: More security in the cloud

Access to corporate networks is traditionally based on trust. This method is anything but secure. Security experts advise introducing a security infrastructure based on the Zero Trust principles. Companies are quite open about distributing permissions and access to their corporate networks to all employees. But now that more and more organizations are moving their applications and workloads from on-premises data centers to the cloud, the potential for unauthorized access, such as hackers, is growing. In the context of network modernization, the time is ripe for a security infrastructure based on the zero trust principle, believes NTT Ltd. and advises the following steps for implementation: 1….

Read more

Identity and access management for Azure Active Directory
B2B Cyber ​​Security ShortNews

Silverfort Unified Identity Protection Platform for Microsoft Azure Active Directory. The platform now enables organizations to centralize identity and access management (IAM) for cloud and legacy on-premises resources on Azure Active Directory, including those that could not previously be migrated. Silverfort, a Unified Identity Protection company and member of the Microsoft Intelligent Security Association (MISA), now enables companies to consolidate identity and access management for all devices, applications and environments on Microsoft Azure Active Directory (Azure AD). Unified Identity Protection Platform for Azure With the Silverfort Unified Identity Protection Platform ...

Read more

Management of privileged access to cloud platforms
Management of privileged access to cloud platforms

New ThycoticCentrify solution for control and management of privileged access to cloud platforms. Companies are increasingly relocating their internal applications to the cloud. ThycoticCentrify, a leading provider of cloud identity security solutions that emerged from the merger of the leading Privileged Access Management (PAM) providers Thycotic and Centrify, enables AWS billing accounts and IAM accounts with its new cloud provider solution (Identity and Access Management) and AWS EC2 instances centrally and in real time. Internal applications are more in the cloud Companies are increasingly relocating their internal applications to the cloud. They often choose a "lift-and-shift" approach to virtual machines ...

Read more