identity management

Cyber Security

A New Approach to Balanced Security and Usability

Security officials are always in a tough spot since they must keep systems and users secure without causing a hindrance…

Read More »
Cyber Security

Identity Management – A Landscape Trying to Fit Square Pegs into Round Holes

Ever tried to fit a square peg into a round hole? Doesn’t work, does it? It is futile to even…

Read More »
Security Culture

Role of Identity and Access Management for An Incident Response

You hear reports of data breaches of different scales every other day. Sometimes the companies are applauded for the way…

Read More »
Cyber Security

Rise of Machines – How to Protect Their Identities?

When we think of machines and their rise, automatically, our mind goes to the series of sci-fi movies that have…

Read More »
Cyber Security

The Cyber Security Challenges in Educational Institutions

Educational institutions have always been targets for hackers. The reason is quite simple, there is a lot of data out…

Read More »
Back to top button
X

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.