Tag: identity and access management

Security or Functionality? Security Risks with Digital Transformation

Digital transformation has been adopted by most companies from around the world, resulting in a more connected and innovative business…

6 years ago

How Technology Can Simplify IT Security

Just last year, the popular Q&A site Quora suffered a data breach, as reported by Techworld in their article on…

6 years ago

Data Protection & Data Privacy – A difference that matters

Data protection and data privacy are so closely linked that people (and sometimes even organizations) tend to think of them…

6 years ago

Agent-based Cloud Security Solution? No thanks!

If your organization relies on the cloud for a majority of its operations, you may want to look closer at…

6 years ago

The Key to Data Security: WebAuthn

What is WebAuthn? WebAuthn (Web Authentication API) is a global standard specification for secure authentication on the Web, formulated in…

6 years ago

Beware of Credential Stuffing

In recent times, you might have noticed user accounts being compromised by the millions, and yet companies refute these claims…

6 years ago

7 Ways in Which Akku can Help you Address Security Challenges

While it is natural to feel apprehensive on the cloud, especially if you are new to it, remember that there…

6 years ago

The Problem with SMS-based Authentication

As mobile phones became more sophisticated, their usage shifted from being communication oriented to application oriented. But phone numbers were…

6 years ago

Hashing And Salting – The What And How

“irgvctxmsr” - sounds like gibberish, doesn’t it? But if you were to decrypt this string using a mono-alphabet shift cipher…

6 years ago

3 Important steps to improve network security against brute-force attacks

A brute-force attack is a type of cybercrime which involves automated hacking activity using bots. The primary aim of a…

6 years ago