EasyJet admits data of nine million hacked

(Source: BBC News) By Jane Wakefield Technology reporter. 7 hours … The firm has informed the UK’s Information Commissioner’s Office while it investigates the breach. EasyJet …

Read more ›

Hitachi Group Began Production of Face Shields

(Source: WebWire) is focusing on Social Innovation Business combining its operational technology, information technology and products. The company’s consolidated revenues …

Read more ›

Canadian Trading Platform VirgoCX Now Protected By Ledger Vault

(Source: GlobeNewswire) Unlike traditional custodial solutions, Ledger Vault’s technology enables … technology, the Ledger Vault provides information technology infrastructure for …

Read more ›

Leidos Completes Acquisition of L3Harris Technologies’ Security Detection and Automation Businesses Creating a Comprehensive, Global Security and Detection Portfolio

(Source: WFMZ Allentown) Leidos is a Fortune 500® information technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the …

Read more ›

RHEL 8.2 reaffirms Red Hat’s commitment to consistency in the hybrid cloud

(Source: SiliconANGLE) release involves the addition of an automated diagnosis and systems management capability, which is especially timely for information-technology managers.

Read more ›

IT Services Firm Enhances UNIX Security While Simplifying Management

SMB clients delivered enterprise-level support with Privileged Access Suite for UNIX.

The 12 Critical Questions You Need to Ask When Choosing an AD Bridge Solution

Most enterprises today have heterogeneous IT environments, with Microsoft Active Directory (AD) providing Windows access for most users, but with other platforms such as Unix, Linux, and Mac OS X providing critical services as well. But each of these systems has its own identity, authentication, and access requirements. This means users can have dozens or hundreds of passwords to remember […]

Securely Managing Your UNIX Environment

With today’s stringent compliance environment, sophisticated and varied threats, and the demand of interoperability with the full range of non-Unix systems—with Microsoft Windows at the forefront—Unix-based organizations face many identity and access management (IAM) challenges. This white paper discusses common IAM challenges facing Unix-based organizations. You’ll learn about some easily implemented practices and technologies that can help increase security, achieve […]

Next-Gen Privileged Access Management Solutions

Are you still using traditional privileged access management (PAM) solutions – or don’t yet have an effective PAM strategy? Then, it’s time to start looking at a Next-Gen PAM solution. Next-Gen PAM isn’t just about secrets, it’s about identities and individual accounts, and entitlements used to grant privileged access to sensitive data and systems. Using an identity-centered approach, Next-Gen PAM […]

What Do Your Peers Have to Say About One Identity Safeguard

Privileged Access Management (PAM) solutions have become essential for compliance and security. If you’re in the market for a PAM solution, read IT Central Station’s independent PeerPaper Report, which is based on unbiased customer reviews of One Identity Safeguard collected at www.itcentralstation.com. In the report, you will hear directly from people who have purchased, deployed and managed One Identity Safeguard. […]