The 3 critical steps to a bulletproof access strategy

It’s an on-the-move, BYOD, cloud-based world. It’s just a fact. And for IT, Security, and Compliance teams – it’s a fact that makes life challenging.

Read More

DevOps, are you really protected against unauthorized access?

This blog was edited on November 12, 2018

Last month’s exposure of an authentication bypass in libssh library, and especially all the media coverage it received, showed how even “not the most...

Read More

Is SDP the future of AAA?

AA what??? That’s a term I haven’t heard for a while, probably since I was teaching Active Directory 10 years back…, however during a very interesting discussion with a customer about the future...

Read More