News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Counter insider threats
Counter insider threats

Being responsible for IT is not the easiest job at the moment. When, in addition to the constant warning about external attacks and the requirement of zero trust principles, there is also the warning about internal insider threats, as a CISO you can ask yourself who else you should trust. Insider threats are a real problem for companies of all types and sizes. A current example is the electric car manufacturer Tesla: Last year, over 100 gigabytes of sensitive data and salary information from tens of thousands of employees across Europe, as well as reports of malfunctions and problems with the products, were received at the Gigafactory Berlin-Brandenburg...

Read more

AI is revolutionizing access management
AI is revolutionizing access management

Many companies are currently considering using artificial intelligence (AI) for identity management. The technology not only allows users to monitor suspicious behavior more effectively and automatically, but also improves security systems. In the study “The State of Identity Governance 2024,” almost 53 percent of the 567 IT experts and executives surveyed said that functions supporting AI in identity and access management, for example, were among the top five priorities when evaluating such a solution. More and more IT administrators are coming to the conclusion that with many traditional IGA (Identity Governance and Administration) systems…

Read more