Register for the Dec 8 RSA Evolution of Identity Summit

The RSA Evolution of Identity Summit will convene thought leaders from across the sector to discuss challenges around cloud and remote workforce security, trends such as Zero Trust, passwordless authentication, and the ...

Zero Trust Becomes a Key Factor in Managing Risk in The Digital Age

Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall among the myriad of security and risk priorities? How does it fit ...

Zero Trust Becomes a Key Factor in Managing Risk in The Digital Age

Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall among the myriad of security and risk priorities? How does it fit ...
What's the point of habitual cookie consent? Analytics?

What’s the point of habitual cookie consent? Analytics?

Last week I read an online post about schoolchildren who are taught in their IT lessons to just accept cookie consent pop-ups when they see them on the screen! That really is ...
Going Beyond Advertising - Publishing 24th November.png

Going Beyond Advertising: Revenue Diversification in Publishing

The pandemic has had a profound short-term effect on publishers around the world -- a jump in readership somewhat dampened by disappearing advertising revenue. In many media firms, the digital channel has ...
3 simple ways to drastically reduce Active Directory administration costs [E-book]

3 simple ways to drastically reduce Active Directory administration costs [E-book]

Any Active Directory (AD) administrator knows that managing AD using just native tools is a chore. To make matters worse, today’s IT environments are more diverse than ever. Increasing cloud adoption coupled ...
Advice: Protecting Lone Workers Through Covid Restrictions

Advice: Protecting Lone Workers Through Covid Restrictions

Protecting lone workers is an issue that businesses may not have come across previously, especially those based in busy city centre office blocks pre-coronavirus. Yet with many thriving business districts deserted through ...

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

Each month there seems to be more news of data breaches, both large and small. As these events continue to increase in frequency, organizations are learning that they must engage, and rapidly, ...
Certificate Management Checklist

The Role of Access Control in Information Security

Access control systems are everywhere and play a key role in identity and access management (IAM)— let’s break down the different types of access control models & how they work... The post ...
Screen Shot 2020-11-11 at 10.34.49 AM

Bitglass’ 2020 Cloud Security Report

This year, the fabric of our society has forgone unimaginable changes due to the global pandemic, and it’s likely that the impact will persist long after it is gone. The inevitable push ...