What is Forgetful Browsing and how will it affect users and website owners? Barry Collins, who remembers everything, reveals exactly what you need to know.
Barcelona has an entire district dedicated to supporting tech development, so we had plenty of choice when picking out the top tech companies in the city.
As security expert Davey Winder explains, all sizes of business – and every individual who works for them – can be a target of an APT attack. Even if the end goal is a much bigger fish.
Read this case study on why DCC chose Okta to maximise the potential of its merger and acquisition campaigns.
Read the Okta for M&A whitepaper now to explore the key challenges businesses face during mergers and acquisitions.
Read the Increasing Agility for Mergers and Acquisitions solution brief by Okta to explore the common barriers that slow down M&A success.
One of the UK's leading security experts reveals how attackers break in to business networks and extort ransoms from their victims. And you can't breathe easy afterwards, as they will likely attack again.
A "never trust, always verify" approach to information security has never been more important, with stolen credentials increasingly used to access networks and data. Is zero trust the answer?
AI adds danger to IT managers' lives, but it can also help them through better insights, enhanced security and implementing Zero Trust policies. James Morris explains how.
Cisco and Norwegian telecoms giant Telenor have renewed their partnership with a focus on cybersecurity and multicloud-as-a-service
Research reveals how cybersecurity defenders can use GPT-3 (and by extension GPT-4) to filter malicious activity and reduce cyber threats
There's a one in two chance that your business is an easy target for hackers. Simon Edwards, founder of one of the world's leading testing labs, explains the practical measures companies can take to tighten security.
Proofpoint and Cybersecurity at MIT Sloane surveyed 600 board directors around the world. Download the report to read their findings.
Westpac has announced a slew of measures to protect its customers against the growing menace of scams, including a four-hour payment delay
If you've ever wondered why IT departments never approve the purchase you're asking for, our (mostly) friendly IT manager has the answer. But you may not like it.
This e-book explores modern threats, best practices for protecting users and data, and what capabilities to look for when enhancing your Microsoft 365 defences
Why insider threat management should be a critical part of your data loss prevention program.
Download 2023 State of the Phish: Asia-Pacific and Japan to learn the biggest regional cyber threats and how to make your users your best defense.
This gated guide reveals how companies can best assess and mitigate user risk and how they can use that information to implement a successful and people-centric cybersecurity strategy.
The CEO of cyber-threat specialist SE Labs explains why spending money on cybersecurity solutions isn't enough on its own - you need to take control.