News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Protecting identities and access
Protecting identities and access

A European cybersecurity provider and identity and access management expert, announces the launch of its SaaS platform, Wallix One. The platform includes the essential solutions companies need to protect their digital activities. This means that employees, external service providers, IT administrators, PLC maintenance personnel or machines and robots only receive access to IT or OT infrastructures, devices, applications and data after their identity and the rights granted to them have been verified. Outsourcing the management of identity and access security solutions to Wallix One offers IT security managers several advantages: control over access to important company resources, reduction of the risks associated with identity theft…

Read more

Privileged Access Management (PAM) is moving to the cloud
Privileged Access Management (PAM) is moving to the cloud

A leading provider of zero-trust and zero-knowledge solutions for protecting credentials, privileged access and remote connections, releases the results of the Keeper Security Insight Report “Cloud-based Privileged Access Management (PAM)”. The report examines what IT and security leaders want from a PAM solution and the benefits of moving away from on-premise installations. 82 percent of respondents said they would be better off moving their PAM solution from on-premises to the cloud. Only 36 percent of IT leaders said an on-premise PAM solution makes sense given the current economic climate. PAM is essential…

Read more

Passwordless procedures a long way off
B2B Cyber ​​Security ShortNews

Although authentication using passwords has long been criticized from a security perspective, companies are still years away from a passwordless reality. This is shown by a new study from Delinea, the specialist for solutions that seamlessly expand privileged access management. 68 percent of the IT decision-makers surveyed stated that passwords are far from “dead” in their companies. The aim of the report “The Future of Workplace Passwords: Not Dead, but Evolving*” was to better understand the future of passwords in the workplace - against the background of the spread of alternative authentication options in the consumer environment such as...

Read more

Privileged access management with multi-factor authentication
Privileged access management with multi-factor authentication

The latest release of Secret Server from a leading provider of solutions that seamlessly extend Privileged Access Management (PAM) now supports enforcement of multi-factor authentication (MFA) for credentials - in addition to the already available MFA for logins. In this way, not only are highly sensitive login data even better secured, but companies are now able to meet increasingly strict compliance requirements. Stolen credentials and human error remain among the most common ways cybercriminals gain access to systems and data. Most accesses with stolen logins According to the…

Read more

Cloud security remains the top concern
Cloud security remains the biggest concern

Cloud security remains the top concern for cybersecurity professionals, a survey at this year's RSA Conference reveals. At this year's RSA Conference in San Francisco, more than 100 cybersecurity professionals were asked about their current most pressing problems in implementing cyber hygiene and the cyber insurance strategies of their companies. Cloud security is the top concern for 39 percent of respondents, followed by ransomware (16 percent) and a distributed workforce (12 percent). This paints a similar picture as in the survey last year. The survey also found that…

Read more

Cloud Server Privilege Management for Dummies

Delinea, a leading provider of seamless security privileged access management (PAM) solutions, is releasing “Cloud Server Privilege Management for Dummies,” a free e-book that provides organizations with valuable best practices for protecting cloud server privileged access . Among other things, the book provides valuable tips on how to sustainably minimize the complexity of securing access to business-critical resources. This is all the more important given that the majority of businesses remain highly vulnerable to cloud server security breaches. For example, the Thales Cloud Security Report 2022 shows that 45 percent of companies in the last…

Read more

Delinea Secret Server with improved disaster recovery
Delinea Secret Server with improved disaster recovery

With the latest version of its proven Secret Server, Delinea, a leading provider of Privileged Access Management (PAM) solutions for seamless security, now offers improved disaster recovery and also sets new standards in terms of remote access. In addition to new design updates based on customer feedback, IT and security teams benefit from new security controls for greater reliability and a remote access service, a VPN-less session management feature that greatly simplifies the integrated management of privileged accounts. Credentials are the weak link As the 2022 CrowdStrike Global Threat Report showed, 80 percent of all cyberattacks involve credentials…

Read more

Study: Cloud automation as a key to cybersecurity
Study: Cloud automation as a key to cybersecurity

Despite the tense security situation, companies overestimate the effectiveness of their security measures. A study shows that cloud automation can be the key to future-proof cybersecurity. The majority of IT decision-makers see cloud automation as an important key to future-proof cyber security, especially in combination with autonomous privileges and access. This is the result of a recent survey by Delinea, a leading provider of privileged access management (PAM) solutions. 86 percent of those surveyed are currently looking for ways to automate access controls, especially for privileged access. At the same time, companies are also increasing their resources to meet the growing threat landscape….

Read more

Hardware, API Server, and Container Risks with Kubernetes
Hardware, API Server, and Container Risks with Kubernetes

Kubernetes is extremely popular, but without proper security measures, it also comes with risks. Security expert CyberArk names three specific risks and shows which defensive measures are required to get hardware, API server and container risks in Kubernetes under control. In software development today, speed and agility are key. Container technology is being used to an increasing extent. Kubernetes has emerged as the de facto standard for managing containerized workloads and services. Security Considerations in Kubernetes From a security perspective, the Kubernetes orchestration platform brings with it specific identity-related challenges that need to be addressed early in the development process. Otherwise...

Read more

ThycoticCentrify improves Secret Server usability
B2B Cyber ​​Security ShortNews

Improved Secret Server usability through automated and simplified secret management: With new security controls, automation features and design updates, the new version of the Secret Server offers companies more protection and greater productivity when managing secrets. ThycoticCentrify, a leading provider of cloud identity security solutions formed from the merger of two leaders in privileged access management (PAM), Thycotic and Centrify, is expanding the capabilities of its award-winning PAM solution, Secret Server. With new security controls, automation features, and design updates, Secret Server builds on its industry-leading secret management capabilities and ease of use to provide more protection...

Read more