Why data breaches happen & what you can do to stop them

War seems to have taken a new form in the Information age. Large corporations have reported increased data breaches in…

7 years ago

The IAM Imperative: Through An SMB’s Eyes

Today’s MNCs were once small or medium businesses (SMBs). Small and medium businesses are the proving ground for emerging technology,…

7 years ago

Password Managers can be Hacked. Now What?

On average, every person has 7.6 accounts - that’s a lot of user IDs and passwords for an individual! Remembering…

7 years ago

Why Blocking Personal Emails in the Workplace is Essential

Your employees accessing their personal email at work for a few minutes in a day sounds harmless enough. But access…

7 years ago

Can you Trust the Agent on your Active Directory?

If a company works with very few applications, user repositories would have to be mapped individually for each application. Every…

7 years ago

Cloud Multi-factor Authentication is the Future of Network Security

Is the only thing standing between your business’ critical data and a cyber attack a set of usernames and passwords?…

7 years ago

DNS Filters for a Safe, Compliant, Productive Workplace

Domain Name System (DNS) is an addressing system used by the internet through which domain names are located and translated…

7 years ago

Adaptive Authentication for more efficient MFA security

Adaptive authentication, method for enforcing the right authentication factors depending on users profile and tendencies. It acts to balance the…

7 years ago

IAM using SSO and Federated Identity Management

Identity management encompasses several operational mechanisms for managing users across a large system or network of applications. Two of the…

7 years ago

5 Cloud Security Myths Busted

One of the main reasons for a number of traditional, older enterprises still being wary of cloud computing is the…

7 years ago