Data security

Transitioning from a legacy IAM to an interwoven Identity Fabric

With the emergence of cloud apps, identities need to be managed outside the traditional network. This has introduced new security…

2 years ago

What is CASB? How has data security changed with the cloud?

A Cloud Access Security Broker (CASB) is an on-premises or cloud-based security policy point-of-enforcement. Originally, asset security was simpler since…

2 years ago

Password Spray Attacks: What Are They & How To Avoid Them?

Ever wondered why organizations emphasize the importance of setting a complicated password as opposed to something convenient like ‘password123’? In…

4 years ago

Cybersecurity Trends 2020: What’s in Store

The year 2019 has been a significant one in the technology world, with several high profile cases grabbing headlines. In…

4 years ago

Understanding Offensive Security

Approximately two billion records were stolen between July and October 2019. That’s just in one quarter of a year! This…

4 years ago

Why an IAM solution is a Crucial Investment for Financial Services Organizations

Today, migrating to the cloud is a crucial stage in a financial enterprise’s growth and development. It is, quite simply,…

4 years ago

Begin Here to Build a Trusted Business

According to the PwC 21st Annual Global Survey, reliability, congruence, consistency, and transparency are the four pillars for building trust…

4 years ago

Security or Functionality? Security Risks with Digital Transformation

Digital transformation has been adopted by most companies from around the world, resulting in a more connected and innovative business…

5 years ago

How Technology Can Simplify IT Security

Just last year, the popular Q&A site Quora suffered a data breach, as reported by Techworld in their article on…

5 years ago

Data Protection & Data Privacy – A difference that matters

Data protection and data privacy are so closely linked that people (and sometimes even organizations) tend to think of them…

5 years ago