Protecting against Phishing: How Companies Can Stay Safe Phishing is becoming...

Protecting against Phishing: How Companies Can Stay Safe Phishing is becoming...
It is important to understand the latest tactics used by adversaries to...
Identity and Access Management (IAM) is a set of processes and technologies...
Cyberattacks against the retail industry are an ongoing concern. There are a number of factors that make retail systems attractive targets for hackers. Fortunately, there are also effective...
We are very happy to have participating in an ambitious identity and access management project for Barcelona by Serveis Municipals (B: SM), a project that places them at the forefront in terms of...
Consum is a retail company. The are a Soffid customer since 2016. The company chose Soffid to be the tool to manage all their identities and accesses. Is that the reason why Consum has increased its...
It is important to understand the latest tactics used by adversaries to compromise cloud infrastructure. Cloud exploitation is on the rise, and it is essential to be aware of the threats that businesses are facing. Why are adversaries accelerating cloud exploitation?...
Identity and Access Management (IAM) is a set of processes and technologies used to manage and protect an organization's data and resources. IAM is a fundamental component of information security and is essential for protecting customer, employee, and business partner...
Cyberattacks against the retail industry are an ongoing concern. There are a number of factors that make retail systems attractive targets for hackers. Fortunately, there are also effective safeguards against these attacks. In an industry that has traditionally only...
We are very happy to have participating in an ambitious identity and access management project for Barcelona by Serveis Municipals (B: SM), a project that places them at the forefront in terms of security, specifically in the areas of protection of the information and...