A different approach to identity security

Identity is now the central security battleground, writes Carolyn Crandall, Chief Security Advocate at identity detection and response product company Attivo. The threat of attackers exploiting user identities has become Read more...

Least Privilege Regaining Popularity

Traditional approaches to network security are no longer sustainable in the cloud age, meaning companies have to adapt quickly. With more remote working, applications have left the secure perimeter, and Read more...