The history of passwords dates back to the Roman Empire. Initially, they were called passcodes, carved into wood, and soldiers passed them around via the active guard to validate soldier and guard
BeyondTrust, the worldwide leader in intelligent identity and access security, has announced the release of a new global survey, “Identity Issues Impact Zero Trust Effectiveness.” The survey’s research focused on understanding current
The invasion of Ukraine is a harrowing ordeal for anyone impacted by the conflict. It is a time of heightened risk and uncertainty, with implications that are rippling across the world. One
The seeds of rushed implementation of remote working and digital transformation bore fruit in the form of once-in-a-decade breaches like SolarWinds, Colonial Pipeline and others that seemed to occur monthly. Looking ahead
On April 6, a threat intelligence report from Onapsis security researchers in coordination with SAP revealed that SAP systems running on misconfigured or outdated software are exposed to increased risk of malicious
Sometimes the most impactful trends materialise completely out of the left field and we have all been reminded and humbled by this in 2020. BeyondTrusts’ annual cybersecurity predictions are projections of possibilities
It’s possible that the earliest security predictions began on that old medium known as print, but that medium’s notoriously poor search capabilities mean the answer remains elusive. One thing’s for certain, the
Realising that most large organisations today have sophisticated security defenses, bad actors are beginning to target third-party vendors, as a means to gain access to an enterprises’ network. In fact, in 2018,
REGIONAL TRANSFORMATION OUTLOOK 2019 2019 will see an increasing number of attacks coordinated with the use of artificial intelligence and machine learning. Artificial intelligence will analyse available options for exploit and develop
People are an organisations’ most valuable resource. But they can also be its greatest vulnerability, especially when armed with weak credentials, all-too-powerful privileged accounts, and security ignorance or hubris. The problem is
I am simply amazed at all the buzz around Bitcoin, blockchain, and cryptocurrency. However, the truth is that blockchain has a limited place in business and needs to be secured just like