Every company must face the new cybersecurity challenges and for this there is...
CATEGORIES
Resources
What is digital trust?
Cybersecurity has become much more complicated in recent years and that...
A convergent approach to enterprise security
Globalization, easy access to information, exponential growth of immigration...
Single Sign On in Compliance With Security Best Practices
The sheer number of tasks we do online grows every year as we create and discover new opportunities to digitize our world. This is true within the workplace as well, but as we find more processes...
Reinventing cybersecurity: Gartner Predictions
The deeper we foray into the Internet Age, the more organizations turn to AI to raise our productivity, improve sales, or enhance our experiences. Now, they are also turning to it to shore up their...
How to Communicate the Value of Information Security
Cyber security has always been an unsought goods like, insurance, which is useful only when something bad happens. And It’s always been challenging for security leaders to communicate the value of...
Reinventing cybersecurity: Gartner Predictions
The deeper we foray into the Internet Age, the more organizations turn to AI to raise our productivity, improve sales, or enhance our experiences. Now, they are also turning to it to shore up their defenses against the crime that inevitably follows. As traditional...
How to Communicate the Value of Information Security
Cyber security has always been an unsought goods like, insurance, which is useful only when something bad happens. And It’s always been challenging for security leaders to communicate the value of cybersecurity investments to board and peers. Furthermore, everyone in...
New interesting benefits at Soffid 3.1
Identity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. We are happy to announce that a new Soffid update is available! These are its main...
Reducing the attack surface for identities and entitlements in the cloud
The attack surface is the number of all possible points, or attack vectors, where an unauthorized user can access a system and extract data. The smaller the attack surface, the easier it is to protect. Organizations must constantly monitor their attack...