Address Resolution Protocol

The DevCentral Chronicles June Edition 1(6)

Heading into the summer months is always a nice time of year – school is out, warmer weather, BBQs, beaches, baseball and maybe some vacation time. And hopefully all the Dads had ...
Unified Access Management for Linux

Unified Access Management for Linux

Unified access management (UAM) is a new term that has recently been created by analysts and vendors to describe a narrow view of the identity and access management (IAM) space, specifically, with ...
Cloud Directory Feature Active Directory Bridge

Cloud Directory Feature Active Directory® Bridge

There has been an awakening in the identity management space—have you felt it? Star WarsTM references aside, a new player has emerged on the scene and is changing the game: the cloud ...
Building Zero Trust networks with Microsoft 365

Building Zero Trust networks with Microsoft 365

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, todays increasingly mobile workforce, the migration towards public cloud ...

2 Strategies to Tighten Your Cloud Security

Creating a thorough and effective security program is difficult enough when your data is stored on-premises. But most organizations and agencies straddle hybridized on-prem and cloud environments—or they’re cloud-native entirely. This complicates ...
Outsourced Cloud Directory – JumpCloud® Directory-as-a-Service®

Outsourced Cloud Directory – JumpCloud® Directory-as-a-Service®

Organizations have been outsourcing IT resources over the past decade, and just about every IT category has made the leap to the cloud. And, while directory services platforms have historically been one ...
What Is RSA Labs? A Q&A with Security Ledger

RSA Labs: Staying Secure Means Staying Relevant

Keeping up with, if not a step ahead, of the bad guys isn?t all that security researchers find themselves battling. Staying upright on a rapidly shifting terrain is made all the more ...
Joe Goldberg

CASB, what is it? Why do I need it? What has it done for me lately?

The first question most people have when they hear the acronym CASB is, “What the heck is this CASB thing?” According to Gartner, a cloud access security broker (CASB) is an on-premises ...
Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty

Cybersecurity & Customer Experience: Embrace Technology and Change To Earn A Customer’s Loyalty

Consumers demand a secure, world-class experience, but when organizations deploy new applications and services to deliver that experience, customer data is put at risk. If forward-thinking organizations are using security as a ...

Blockchain Needed as Cybercrime Goes Corporate

The early days of cybercrime were a simpler time. What was once largely the domain of individuals — with agendas running the spectrum from curiosity, to mischief, to anarchy, to crime — ...
Loading...