authorization
5 Reasons Why Mobile Application Security Fails
Traditionally, large organizations and the enterprise have been the focus for hackers and malicious attacks, but in recent years, the rise of sophisticated hacking tools and leaked databases on the dark web, ...
Security Boulevard
The Security Challenges of the Cloud
As more companies transition to the cloud, their sensitive corporate- and compliance-related data are no longer stored and used behind multiple layers of perimeter security. Instead, security teams are faced with multiple ...
Security Boulevard
On Authorization and Implementation of Access Control Models
There are dozens of implementations of authorization mechanisms. When there are complex requirements dictated by business processes, authorization mechanisms may often be implemented incorrectly or, at least, not optimally. The reason for ...
Next Generation Distributed Authorization
Simon M | | authorization, capability based access control, distributed enforcement, machine learning
Many of today's security models spend a lot of time focusing upon network segmentation and authentication. Both of these concepts are critical in building out a baseline defensive security posture. However, there ...
12 Steps to Zero Trust Success
Simon Moffatt | | 2-factor authentication, access management, authorization, Cyber Security, identity management, trust zero, zero trust
A Google search for “zero trust” returns ~ 195Million results. Pretty sure some are not necessarily related to access management and cyber security, but a few probably are. Zero Trust was a ...
Authentication, Authorization, Accounting and Identity Management
John Busso | | accounting, Authentication, authorization, Cybersecurity, management, Network Security, passwords, security
The AAA framework is the logic behind Identity Management systems. AAA stands for Authentication, Authorization, and Accounting that this blog will explain. Authentication “Authentication is the act of confirming the truth of ...

