Author: Dinesh Harikrishnan

Customer Identity and Access Management – How is it different from IAM?

For organizations, it is crucial to ensure data security and, therefore, IAM has become a crucial part of every network…

6 years ago

Data Protection & Data Privacy – A difference that matters

Data protection and data privacy are so closely linked that people (and sometimes even organizations) tend to think of them…

6 years ago

Healthcare Data, HIPAA Compliance, and Akku

The Health Insurance Portability and Accountability Act (HIPAA) has been effective in the USA since 1996.  The Act actually has…

6 years ago

Akku Vs. Okta – Understand Before you Choose

Akku and Okta are both highly efficient cloud security solutions that strive to help companies manage and secure user authentication…

6 years ago

Is Social Login a Secure Login?

Social login is a form of single sign-on, where users are allowed to log into an application or website using…

7 years ago

To Implement or Ignore: MFA for Custom Apps & Websites

Multi-factor authentication (MFA) is one of the most highly recommended security measures in this age of brute-force attacks, data breaches…

7 years ago

The Problem with SMS-based Authentication

As mobile phones became more sophisticated, their usage shifted from being communication oriented to application oriented. But phone numbers were…

7 years ago

3 Important steps to improve network security against brute-force attacks

A brute-force attack is a type of cybercrime which involves automated hacking activity using bots. The primary aim of a…

7 years ago

Protect your Business from Privilege Abuse with IAM

Privilege abuse - that is the security threat that your business’s IT team is most worried about. According to a…

7 years ago

Why data breaches happen & what you can do to stop them

War seems to have taken a new form in the Information age. Large corporations have reported increased data breaches in…

7 years ago