article thumbnail

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

The Last Watchdog

Not long afterwards, in about the 2010 time frame, IAM vendors first arrived on the scene, including Optimal IdM, Centrify, Okta and CyberArk, followed by many others. Indeed, unauthorized access to confidential data continues to be root cause for just about any headline-grabbing data breach you care to name.

article thumbnail

IRISSCON 2023: OT, AI, and human empathy

BH Consulting

Rising attacks against critical infrastructure Data Breach Today reported that cyberattacks against Ukrainian critical infrastructure have intensified during 2023. “In Stuxnet in 2010 was the first the most recent was CosmicEnergy in 2023. It misused operational technology to make changes in the operating environment.

article thumbnail

7 Trends I Spotted When Reviewing 2020 and the Cybersecurity Skills Gap

Jane Frankland

Awareness and interest in cybersecurity is up Thanks to media attention due to hacks and data breaches plus campaigns and initiatives run by governments, tech giants, system integrators, cybersecurity consultancies and product vendors, more people than ever are interested in cybersecurity. Here’s my answer. #1.