Identities, resources, assets, data, devices, code, cloud, companies, APIs, apps, partners, people... there are so many factors at play in companies today, so many attack vectors and surfaces, so much to manage and more, but in a sea of cyber attacks, CyberArk stands ready to help you go fearlessly forward, with CyberArk Australia and New Zealand Regional Director, Thomas Fikentscher, joining iTWireTV to explain the state of cybersecurity.
CyberArk Is the Only Identity Security Company Recognised as a Leader in oth the Gartner Magic Quadrant Reports for Access Management and Privileged Access Management
CyberArk (NASDAQ: CYBR, the global leader in Identity Security, today announced it was named a Leader in the newly released 2022 Gartner Magic Quadrant„ for Access Management1. This recognition follows CyberArk’s position as a Leader in the 2022 Gartner Magic Quadrantâ„for Privileged Access Management, making it the only company to be recognised as a Leader in both reports.
The Australian Parliament passed the Security Legislation Amendment (Critical Infrastructure Protection) Act 2022 earlier this year with mandatory periods for critical infrastructure cyber security incidents to be reported, but what does it mean for you in practice? CyberArk solutions engineering manager Andrew Slavkovic spoke to iTWire to explain.
Security intelligence company LogRhythm has appointed 20-year IT industry veteran Michael Bovalino as Australia and New Zealand country manager.
Identity security specialist CyberArk has appointed Dr Stephenie Andal to the role of ANZ partner manager.
Microsoft has released 97 CVEs on its first patch Tuesday of 2022, including four zero-days that have been publicly disclosed but not yet exploited in the wild; one of these is wormable.
Consultancy PwC Australia has agreed to acquire IT security and risk management firm WebSecure Technologies Australia.
COMPANY NEWS: Solista, an award-winning Australian cloud transformation and security consultancy, has announced the formation of the Zero Trust Alliance, an integrated security offering combining best-of-breed technologies from market-leading security vendors, CrowdStrike, Netskope, Okta, Illumio, CyberArk and Mimecast.
We ask senior IT industry executives for their thoughts on the likely confluence of SDN, Cloud, Edge and Zero-trust in the near future.
Identity security provider CyberArk has announced the availability of Cloud Entitlements Manager, Endpoint Privilege Manager and its Workforce Identity solutions on Amazon Web Services marketplace.
If you pass on having a strong password that you regularly update, and if you pass on using a password manager, then you won’t get a pass mark in the test of life, so please don’t fail yourself or the digital twin that is your online existence - please take passwords as seriously as you take locking your house, car or anything else you value.
We asked a number of IT executives what the 'new normal' might look like as the impact of COVID-19 wanes.
GUEST INTERVIEW: During 2020, cyber attacks surged, teaching business many lessons that have made companies and their staff much safer, but as the attacks continue, what must companies do to be as proactively secure as possible?
Do Industry executives think our lives will improve? Or will it be Groundhog Year?
GUEST OPINION This year has seen the massive acceleration of digital transformation initiatives in Australia to support the new hybrid work reality most organisations have found themselves in. Many are still dabbling with the idea of having a greater reliance on remote work for quite some time, if not permanently.
Privileged access management company CyberArk has appointed Thomas Fikentscher as regional director for Australia and New Zealand.
Organisations are mostly not securing business critical applications, but despite this many of those surveyed indicate that they are confident their organisation can effectively stop all data security attacks or breaches at the perimeter.
Researchers at security firm CyberArk were able to gain access to the underlying server running Docker's playground website because of the additional permissions provided in the set-up, the company says, adding that this was unlikely to be the case on all production sites which used Docker.
On the eve of Google's campaign to flaunt its security credentials by marking sites which do not have https, the Israeli security firm CyberArk has revealed details of a flaw in the search giant's own APIs, which could have caused it to lose considerable income.
Privileged access security vendor CyberArk has announced the availability of CyberArk Conjur Enterprise for Red Hat OpenShift Container Platform, and claims it will simplify secrets management and provide flexibility to securely deploy enterprise apps at scale.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]