The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity plays a pivotal role in all facets of business functions. Overseeing identity and access presents challenges in determining who should have access to what. This process requires a contextual understanding of the roles and duties of numerous individuals within an organization, ranging from system owners…
Cloud Security isn’t easy. But it’s more secure, specifically for complex solutions like SAP systems.
SAP security doesn’t need to be complex, since a lot of tasks can be automated – but what about SAP security in the cloud?
The risk of suffering a security breach is no longer ‘if’ or even ‘when’ – it’s more a question of ‘how often’. Unfortunately, what is often overlooked is the crucial role human expertise plays in defeating the wide range of malicious activities.
The goal of these companies is to make the job of protecting user data easier for the user
Read our archived Newsletters here.
The healthcare industry is a vulnerable target of cybercriminals, but not for the reasons most business sectors are. Between 80 and 90 percent of all cybercrime results from people not following basic cyber hygiene practices, but in healthcare criminals gain access to information through infrastructure weaknesses and the murky third-party agreements.
October is coming to an end – and so is Cybersecurity Awareness Month. This year, we spoke to ten industry experts about staying #CyberSmart.
WhatsApp’s refusal to re-evaluate their privacy policy has caused many people to look elsewhere – here are some apps and tipps to keep your data private and secure.
The Dark Web is something like the speakeasy of the internet. Anyone who likes to ensure anonymity in days when literally every activity online is tracked can use it. It’s also a safe place for whistleblowers or dissidents in repressive
Solving cybersecurity issues can boil down to a single weakness: personnel, but hiring qualified security workers is hard when you don’t know what skills are needed. Building from within with proper tools can overcome that lack of knowledge.
In the first executive event on API security, Sandy Carielli from Forrester focused on API security from a development perspective – read her conclusion in our exclusive coverage.
Operational Technology (OT) facility security has gone from nice-to-have to critical over the last decade,. It is important to understand this sector and how the introduction of tailored Breach Attack Simulation systems is changing OT cybersecurity.
Our first magazine is out – and we thought, we’d tease the content by publishing this article from our friends at BLST Security. This article gives an insight into different tools you can use for securing your APIs.
A new variant of one of the most infamous malware has been spotted in the wild. No need to panic – if you follow some basic cybersecurity hygiene.
Today is Safer Internet Day and we thought we’d try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is all about.
In today’s world, data is stored and processed across a broad range of locations. That can lead to issues with data governance, says Michael Queenan from Nephos Technologies.
Biometrics is a hub for personal security, identity theft and government surveillance. Protecting that stuff is kind of important. One way to do that is by decentralizing it.