Identity & Access

Register for the Dec 8 RSA Evolution of Identity Summit

The RSA Evolution of Identity Summit will convene thought leaders from across the sector to discuss challenges around cloud and…

3 days ago

Zero Trust Becomes a Key Factor in Managing Risk in The Digital Age

Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall…

5 days ago

Zero Trust Becomes a Key Factor in Managing Risk in The Digital Age

Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall…

5 days ago

What’s the point of habitual cookie consent? Analytics?

Last week I read an online post about schoolchildren who are taught in their IT lessons to just accept cookie…

2 weeks ago

Going Beyond Advertising: Revenue Diversification in Publishing

The pandemic has had a profound short-term effect on publishers around the world -- a jump in readership somewhat dampened…

2 weeks ago

3 simple ways to drastically reduce Active Directory administration costs [E-book]

Any Active Directory (AD) administrator knows that managing AD using just native tools is a chore. To make matters worse,…

2 weeks ago

Advice: Protecting Lone Workers Through Covid Restrictions

Protecting lone workers is an issue that businesses may not have come across previously, especially those based in busy city…

2 weeks ago

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

Each month there seems to be more news of data breaches, both large and small. As these events continue to…

2 weeks ago

The Role of Access Control in Information Security

Access control systems are everywhere and play a key role in identity and access management (IAM)— let’s break down the…

2 weeks ago

Bitglass’ 2020 Cloud Security Report

This year, the fabric of our society has forgone unimaginable changes due to the global pandemic, and it’s likely that…

3 weeks ago