Trends in IT-Security and IAM in 2021, the “New Normal” and beyond

Article by Dennis Okpara, Chief Security Architect & DPO at IDEE GmbHYes, there is hope for 2021, but the challenges of the “New Normal” are here to stay. CISOs have to prepare and ...
Oracle Strengthens Interoperability and User Experience with General Availability of FIDO2 WebAuthn Support for Cloud Identity

Oracle Strengthens Interoperability and User Experience with General Availability of FIDO2 WebAuthn Support for Cloud Identity

"Given the distributed nature of today’s technology environment, zero trust has become the standard for security. Every interaction must be authenticated and validated for every user accessing every system or application every ...

I, Robot ? Identity Rules for Robots

Robotic Process Automation plays a key role in the enterprise, executing repetitive tasks with ?bots? instead of human staff. But this technology comes with new risks ? what does that ?bot? account ...

Zero Trust Becomes a Key Factor in Managing Risk in The Digital Age

Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall among the myriad of security and risk priorities? How does it fit ...

Zero Trust Becomes a Key Factor in Managing Risk in The Digital Age

Zero Trust is the security leader's 'answer de jour' for addressing rapidly accelerating digital transformation projects. Where should it fall among the myriad of security and risk priorities? How does it fit ...
Thundra Logo Z

Advanced Tips on Managing Multi-Account Setup on AWS with Terraform

| | aws, DEVOPS, iam, Terraform
In this article, we’ll discover how to use HashiCorp's popular infrastructure as code tool, Terraform in our advantage on AWS, specifically to manage multiple accounts as this is the way AWS wants ...

3 Steps to Building a Resilient Incident Response Plan

According to the Accenture State of Cybersecurity 2020 report, the average cost of a cyber attack for ‘non-leaders’ stands at $380,000 per incident. The report classifies organizations into ‘leaders’ and ‘non-leaders.’ The ...
ransomware health care

Modern Healthcare Tech Also Means Modern Security

Modernizing healthcare infrastructure also needs to include better ways to protect data Enterprises across a range of industries have digitally transformed over the years to upgrade business operations, realize higher growth potential ...
Security Boulevard
How IAM works?

Why understanding IAM (Identity and Access Management) Is Most Important For Better Cybersecurity

Identity Access Management (IAM) is a collective term that covers business policies, processes, technologies, and products that are used to manage user identities and regulate user access within an organization. IAM frameworks ...