CATEGORIES

Resources

Reinventing cybersecurity: Gartner Predictions

The deeper we foray into the Internet Age, the more organizations turn to AI to raise our productivity, improve sales, or enhance our experiences. Now, they are also turning to it to shore up their defenses against the crime that inevitably follows. As traditional...

How to Communicate the Value of Information Security

Cyber security has always been an unsought goods like, insurance, which is useful only when something bad happens. And It’s always been challenging for security leaders to communicate the value of cybersecurity investments to board and peers. Furthermore, everyone in...

New interesting benefits at Soffid 3.1

Identity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. We are happy to announce that a new Soffid update is available! These are its main...

Reducing the attack surface for identities and entitlements in the cloud

  The attack surface is the number of all possible points, or attack vectors, where an unauthorized user can access a system and extract data. The smaller the attack surface, the easier it is to protect. Organizations must constantly monitor their attack...
New interesting benefits at Soffid 3.1

New interesting benefits at Soffid 3.1

Identity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. We are happy to announce that a new Soffid update is available! These are its main...