Stay up to date with the latest news, opinions and free resources from Device Authority.
From company announcements, expert opinion on the latest IoT security issues or helpful guides to support your own organization, use our filters below to find the resources most useful for you.
Privileged Access Management (PAM) is a comprehensive methodology for managing and securing privileged accounts—those that possess elevated permissions to perform critical functions within an organisation’s IT infrastructure. These accounts enable access to sensitive data and systems, making them highly attractive to cybercriminals. The core objective of PAM is to ensure that only authorised personnel have access to these accounts, under strict monitoring and control.
Privilege Access Management (PAM) controls access to privileged accounts, a key step in securing sensitive data and systems. Discover what PAM is, why you need it, and how to implement it effectively.
As digital transformation accelerates, so do the cybersecurity risks, particularly for organisations handling critical infrastructure and sensitive data. To address these challenges, the European Union has updated its cybersecurity regulations with NIS2 (Network and Information Security Directive 2), expanding and strengthening the original NIS Directive, which was established to improve cybersecurity across essential sectors. As the deadline for NIS2 compliance is upon us, let’s take stock of its implications and how to ensure its benefits continue long into the future.
As the Internet of Things (IoT) continues to expand across industries such as healthcare, automotive, manufacturing, and smart cities, the need for robust security measures has become more critical than ever. The proliferation of internet connected devices across various sectors, including healthcare and smart homes, has introduced significant security risks.
Landmark milestone for Microsoft’s Rising Azure Technology 2023 Microsoft Partner of the Year Award winner, highlights growth and innovation in global IoT and AI security
In recent years, critical infrastructure (CI) has become a primary target for cybercriminals and nation-state actors. The systems that provide essential services such as energy, water, transportation, and healthcare are increasingly vulnerable to attacks that could have devastating consequences for entire regions or even nations. As well as the recent attack on American Water, one of the most notable incidents was the Colonial Pipeline attack in 2021, which disrupted fuel supplies across the East Coast of the United States, highlighting the fragility of CI in the face of sophisticated cyber threats.
CyberArk’s Privileged Access Management helps organisations secure privileged accounts and protect sensitive data from cyber threats. This article covers its key features, how it works, and the benefits it offers for cybersecurity, with insights on how it stands out in the market.
The alarming rise in OT cyber-attacks on America’s critical infrastructure has highlighted the urgent need to prioritize investment in defending against OT-specific cyber threats. Oil and Gas, Utilities, and other critical infrastructure companies must reassess their approach to cybersecurity and mitigate attacks across converged systems. Investing in advanced threat detection, employee training to raise cyber risk awareness, and incident response capability has become more urgent than ever before.
1 event, 3 theatres