Cyber resilience refers to the ability to protect electronic data and systems...
CATEGORIES
News
Digital Signatures
A digital signature is a mathematical technique used to validate the...
Soffid 3.3.X: An improved version of our platform
In today’s digital world, enterprise IT and security professionals are...
Converging the identity pillars
Rising need for better data security and disaster recovery solutions and growing demand to improve workload performance are some key factors driving global hyper-converged infrastructure market...
Single Sign On in Compliance With Security Best Practices
The sheer number of tasks we do online grows every year as we create and discover new opportunities to digitize our world. This is true within the workplace as well, but as we find more processes...
Main elements to include in a company cybersecurity strategy
There is no “one size fits all” when it comes to cybersecurity. Over the last six months, we have seen an escalation in the number of reported cyberattacks, in their range, sophistication and in...
How to Communicate the Value of Information Security
Cyber security has always been an unsought goods like, insurance, which is useful only when something bad happens. And It’s always been challenging for security leaders to communicate the value of cybersecurity investments to board and peers. Furthermore, everyone in...
Converged Identity and Access Management to manage user access
Converged IAM (Identity and Access Management) unifies disparate physical and logical access control systems to create a singular trusted identity and credential to match rights and access them across the enterprise. Converged IAM can't exist without network...
Multifactor Authentication
Multifactor authentication (MFA) is a security technology that requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction. Multifactor authentication combines two or more...
Reducing the attack surface for identities and entitlements in the cloud
The attack surface is the number of all possible points, or attack vectors, where an unauthorized user can access a system and extract data. The smaller the attack surface, the easier it is to protect. Organizations must constantly monitor their attack...