data security

Data Logging and Audit: The IAM advantage

One of the key functions of an effective Identity and Access Management (IAM) solution is data logging, to capture and…

2 years ago

Managing Identity and Access in the Workplace

Identity and access management, sometimes simply known as identity management, refers to the IT function of maintaining security through the…

4 years ago

Begin Here to Build a Trusted Business

According to the PwC 21st Annual Global Survey, reliability, congruence, consistency, and transparency are the four pillars for building trust…

4 years ago

Customer IAM for GDPR Compliance

In order to protect the digital privacy of European citizens, the European Union created the General Data Protection Regulation to…

5 years ago

Identity and Access Management for Social Engineering Attacks

When in action, a social engineering attack could look like an email received from a government organization or your own…

5 years ago

Security vs. Usability

Security vs. usability - the debate has been around for quite a while now. Which one would you prioritize? Would…

5 years ago

Is Social Login a Secure Login?

Social login is a form of single sign-on, where users are allowed to log into an application or website using…

5 years ago

Beware of Credential Stuffing

In recent times, you might have noticed user accounts being compromised by the millions, and yet companies refute these claims…

5 years ago

DNS Filters for a Safe, Compliant, Productive Workplace

  Domain Name System (DNS) is an addressing system used by the internet through which domain names are located and…

5 years ago

Prevent Cybercrime with the Zero Trust Model of Cybersecurity

Would you trust just anyone to enter your home? Or would you first confirm that you know them and they…

5 years ago