IAM in a shifting environment

IAM in a shifting environment

The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity plays a pivotal role in all facets of business functions. Overseeing identity and access presents challenges in determining who should have access to what. This process requires a contextual understanding of the roles and duties of numerous individuals within an organization, ranging from system owners…

blue, mac wallpaper, sky

Cloud’s Silver Linings – The potential for More Consistently Secured Landscapes

Cloud Security isn’t easy. But it’s more secure, specifically for complex solutions like SAP systems.

Gray Clouds

SAP Security Does Not Have To Be Complex

SAP security doesn’t need to be complex, since a lot of tasks can be automated – but what about SAP security in the cloud?

man in white shirt wearing black cap

The Cybersecurity Challenge: Why Human Expertise Matters

The risk of suffering a security breach is no longer ‘if’ or even ‘when’ – it’s more a question of ‘how often’. Unfortunately, what is often overlooked is the crucial role human expertise plays in defeating the wide range of malicious activities.

Kristi Melani talks about cyber responsibility

How companies are helping customers take responsibility for security

The goal of these companies is to make the job of protecting user data easier for the user

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

#BeCyberSmart This Cybersecurity Awareness Month

October is coming to an end – and so is Cybersecurity Awareness Month. This year, we spoke to ten industry experts about staying #CyberSmart.

Best Messaging Apps to Keep Your Data Private and Secure

WhatsApp’s refusal to re-evaluate their privacy policy has caused many people to look elsewhere – here are some apps and tipps to keep your data private and secure.

How the Dark Web works

The Dark Web is something like the speakeasy of the internet. Anyone who likes to ensure anonymity in days when literally every activity online is tracked can use it. It’s also a safe place for whistleblowers or dissidents in repressive

Building a collaborative security team: Case Study

Solving cybersecurity issues can boil down to a single weakness: personnel, but hiring qualified security workers is hard when you don’t know what skills are needed. Building from within with proper tools can overcome that lack of knowledge.

Is ‘API Security’ an oxymoron?

In the first executive event on API security, Sandy Carielli from Forrester focused on API security from a development perspective – read her conclusion in our exclusive coverage.

When Securing OT Facilities, BAS Provides a Much-Needed Mirror

Operational Technology (OT) facility security has gone from nice-to-have to critical over the last decade,. It is important to understand this sector and how the introduction of tailored Breach Attack Simulation systems is changing OT cybersecurity.

The Case for Business Logic in Software Development

Our first magazine is out – and we thought, we’d tease the content by publishing this article from our friends at BLST Security. This article gives an insight into different tools you can use for securing your APIs.

The Mirai Botnet Returns, But Don’t Panic

A new variant of one of the most infamous malware has been spotted in the wild. No need to panic – if you follow some basic cybersecurity hygiene.

Cheat Sheet: 3 Best Tips for Safer Internet Day

Today is Safer Internet Day and we thought we’d try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is all about.

The Gold Standard of Data Governance: Choosing the Right Tools

In today’s world, data is stored and processed across a broad range of locations. That can lead to issues with data governance, says Michael Queenan from Nephos Technologies.

Decentralizing data can frustrate hackers

Biometrics is a hub for personal security, identity theft and government surveillance. Protecting that stuff is kind of important. One way to do that is by decentralizing it.