mobile application security

5 Reasons Why Mobile Application Security Fails

Traditionally, large organizations and the enterprise have been the focus for hackers and malicious attacks, but in recent years, the rise of sophisticated hacking tools and leaked databases on the dark web, ...
Security Boulevard
cloud

The Security Challenges of the Cloud

As more companies transition to the cloud, their sensitive corporate- and compliance-related data are no longer stored and used behind multiple layers of perimeter security. Instead, security teams are faced with multiple ...
Security Boulevard

On Authorization and Implementation of Access Control Models

There are dozens of implementations of authorization mechanisms. When there are complex requirements dictated by business processes, authorization mechanisms may often be implemented incorrectly or, at least, not optimally. The reason for ...
Next Generation Distributed Authorization

Next Generation Distributed Authorization

Many of today's security models spend a lot of time focusing upon network segmentation and authentication. Both of these concepts are critical in building out a baseline defensive security posture. However, there ...
12 Steps to Zero Trust Success

12 Steps to Zero Trust Success

A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a ...
authentication authorization accounting

Authentication, Authorization, Accounting and Identity Management

The AAA framework is the logic behind Identity Management systems. AAA stands for Authentication, Authorization, and Accounting that this blog will explain. Authentication “Authentication is the act of confirming the truth of ...