What is Dynamic Authorization & Why Does it Matter?

What is Dynamic Authorization & Why Does it Matter?

Dynamic authorization rewards customers with the security they need and effectively improves their experience with your brand. It helps to meet your customer’s needs and, at the same time, gives you much ...
zero-trust

Implementing Zero-Trust Security With Service Mesh and Kubernetes

IBM’s recent Cost of a Data Breach report revealed that data breaches cost companies an average of $4.35 million in 2022, up 12.7% from 2020. This report also noted that 79% of ...
Security Boulevard
2022 Emerging IAM Technology Spend

2022 Emerging IAM Technology Spend

I recently ran another of my highly scientific industry polls - via LinkedIn to get a feel for this years spending patterns as they pertain to some emerging identity and access management ...
credentials authorization PAM governance digital identity IAM authorization

Next-Generation Authorization for Advanced Access Controls

Authorization is an essential part of any modern enterprise’s identity and access management (IAM) solution. Acting as an organizational gatekeeper, it is the process that determines which employees can access which company ...
Security Boulevard

Forging Australian Driver’s Licenses

The New South Wales digital driver’s license has multiple implementation flaws that allow for easy forgeries. This file is encrypted using AES-256-CBC encryption combined with Base64 encoding. A 4-digit application PIN (which ...
M2M Authorization: Authenticate Apps, APIs, and Web Services

M2M Authorization: Authenticate Apps, APIs, and Web Services

How can you ensure APIs, web services, and business systems communicate and access the information securely without human intervention? The answer is machine-to-machine (M2M) authorization ...
Ask Martin

The case for dynamic authorization in banking and finance

More than other organizations, banks, and financial institutions face the highest levels of scrutiny when it comes to how they protect critical assets and sensitive... The post The case for dynamic authorization ...

The not-so-obvious cost of fraud to your company’s bottom line

It’s no longer a matter of if your business data has been breached; it’s a matter of how much […] The post The not-so-obvious cost of fraud to your company’s bottom line ...
passwords VPNs mobile application security

5 Reasons Why Mobile Application Security Fails

Traditionally, large organizations and the enterprise have been the focus for hackers and malicious attacks, but in recent years, the rise of sophisticated hacking tools and leaked databases on the dark web, ...
Security Boulevard
Sample table of Delete actions in AWS

Safeguard Your Infrastructure – It’s Never Too Early for Spring Cleaning

Is your cluttered infrastructure inviting unnecessary risk exposure? There are few things as liberating as a thorough spring cleaning. We notice accumulation of unnecessary “stuff” — clothes we no longer wear, household ...