From the integration with CloudKnox, AWS IAM Access Analyser is a new function that analyses resource policies to help administrators and security teams protect their resources from unintended access.
In this video, SentinelOne take a look at how hackers steal our passwords and what we can do to stop them.
We are excited to announce our Gold Partner, Cloudknox have been nominated for another Cyber Security Award!
Apple is moving their existing Device Enrolment Program (DEP) and Volume Purchase Program (VPP) to end of life on December 1, organisations will need to upgrade to Apple Business Manager by that date.
Balaji discovered that organisations were predominantly relying on role-based access controls (RBAC) to solve their growing identity privilege challenge.
Managing and securing privileged identities and access to sensitive systems, infrastructure and data is rapidly evolving as a must-have compliance mandate.
Rob comes with over 25 years’ experience of working with start-ups in the cyber security space, having held leadership and business development roles in his fruitful career. He brings a combination of technical and business aptitude to resolving customer challenges.
A recent BBC report highlights the importance of defending mobile devices that can access corporate data from not just obviously rogue apps (e.g. blocking sideloading) but also seemingly ‘good’ apps that may contain recycled code.
Reports this week have announced that computers at the DCH medical centres have been infected with ransomware. Three hospitals that make up the group in Alabama were closed to new patients as the attack paralysed the health network’s computer system.
With a new direction comes a fresh new look and feel. We’ve invested a huge amount of the time in understanding the key features of each product and solution, whilst using our knowledge and insights to match these to our customer’s requirements.