As 2018 draws to a close, it’s time to reflect on the strides the cybersecurity industry made over the past year, and how far companies around the world still have to go to improve their security posture. Throughout the year, businesses were plagued by cybersecurity risks and hit with massive…
Read More
Tomer Agayev leads a security team that keeps our hard-earned savings safe from fraudsters. As threat research team lead at IBM Trusteer, Tomer guards the gateway to threats both known and unknown. His team’s responsibility is to monitor new and emerging threats, understand them intimately, and feed information to the…
Read More
Most security systems today are built with data confidentiality in mind. This is a crucial exercise, but confidentiality only makes up for one dimension of data privacy. As security expert Bruce Schneier told the audience at SpiceWorld 2018, the time has come to reconsider our understanding of data privacy and…
Read More
The importance of implementing privileged access management (PAM) is undeniable. A user with privileged access holds the keys to the kingdom, access to the highly valuable and confidential information that is often targeted by cybercriminals and malicious insiders. In fact, Gartner listed PAM as the No. 1 project for security…
Read More