Data Protection & Data Privacy – A difference that matters

Data protection and data privacy are so closely linked that people (and sometimes even organizations) tend to think of them…

6 years ago

Healthcare Data, HIPAA Compliance, and Akku

The Health Insurance Portability and Accountability Act (HIPAA) has been effective in the USA since 1996.  The Act actually has…

6 years ago

What is Continuous Authentication?

Technology users today are spoilt for choice when it comes to the types of devices and the variety of platforms…

6 years ago

Akku Vs. Okta – Understand Before you Choose

Akku and Okta are both highly efficient cloud security solutions that strive to help companies manage and secure user authentication…

6 years ago

Akku’s Agentless AD Connector For Improved Security

The AD connector which comes with Akku, allows organizations to use either their on-prem AD or Azure AD as the…

7 years ago

Agent-based Cloud Security Solution? No thanks!

If your organization relies on the cloud for a majority of its operations, you may want to look closer at…

7 years ago

A How-to Guide to Privileged Identity Management

Privileged Identity Management (PIM) refers to the control and monitoring of access and activity involving privileged user identities within an…

7 years ago

What is advanced server access?

Advanced Server Access is a relatively new aspect of identity and access management system for the cloud. In fact, it…

7 years ago

Is Social Login a Secure Login?

Social login is a form of single sign-on, where users are allowed to log into an application or website using…

7 years ago

The Key to Data Security: WebAuthn

What is WebAuthn? WebAuthn (Web Authentication API) is a global standard specification for secure authentication on the Web, formulated in…

7 years ago