Change requests, permission levels, and slow processes: that’s what comes to mind for most people when you ask them about identity management. Identity management interfaces and tools are an altogether…read more →
Change requests, permission levels, and slow processes: that’s what comes to mind for most people when you ask them about identity management. Identity management interfaces and tools are an altogether…read more →
How do you know if you’re making progress in Identity management? Unlike other parts of cybersecurity, such as crisis management, there’s no definitive end point. If you’re the manager responsible…read more →
How do you know if you’re making progress in Identity management? Unlike other parts of cybersecurity, such as crisis management, there’s no definitive end point. If you’re the manager responsible…read more →
Avatier has fixed a vulnerability regarding weak social engineered questions, however, you are NOT AT RISK if you require additional authentication, like Avatier SMS, email One Time Passcode (OTP), or…read more →
Avatier has fixed a vulnerability regarding weak social engineered questions, however, you are NOT AT RISK if you require additional authentication, like Avatier SMS, email One Time Passcode (OTP), or…read more →
What is the most thankless task in technology today? If you answered “the help desk,” you’d be wrong. The help desk responds to users in need and fixes their problems.…read more →
What is the most thankless task in technology today? If you answered “the help desk,” you’d be wrong. The help desk responds to users in need and fixes their problems.…read more →
Digital transformation is a buzzword we hear more and more each year. It seems like a new spin on the dotcom era “New Economy” that emerged 20 years ago. Before…read more →
Digital transformation is a buzzword we hear more and more each year. It seems like a new spin on the dotcom era “New Economy” that emerged 20 years ago. Before…read more →
Hyper-growth is the Holy Grail of technology companies. Grow fast enough and you have your choice of acquisition, new investment, and more. Focusing on that goal is natural. Yet, when…read more →
Hyper-growth is the Holy Grail of technology companies. Grow fast enough and you have your choice of acquisition, new investment, and more. Focusing on that goal is natural. Yet, when…read more →
Your password policy is probably broken, and you may not even know it. How’s that possible? Consider the following scenario. You drafted your password policy a few years ago because…read more →
Your password policy is probably broken, and you may not even know it. How’s that possible? Consider the following scenario. You drafted your password policy a few years ago because…read more →
Choosing the right cybersecurity software solution is difficult. If you buy the wrong package, you’ll look bad in front of your executives. You might even be blamed for your company’s…read more →
Choosing the right cybersecurity software solution is difficult. If you buy the wrong package, you’ll look bad in front of your executives. You might even be blamed for your company’s…read more →
Deciding whether to use cloud services is no longer the central IT question. Every enterprise, even security-conscious government departments, use the cloud. The key question is this: are you operating…read more →
Deciding whether to use cloud services is no longer the central IT question. Every enterprise, even security-conscious government departments, use the cloud. The key question is this: are you operating…read more →
There’s a growing vulnerability weakening your cybersecurity department. It has nothing to do with vendors, and it doesn’t involve patches or penetration testing. Yet, neglecting this hidden problem has the…read more →
There’s a growing vulnerability weakening your cybersecurity department. It has nothing to do with vendors, and it doesn’t involve patches or penetration testing. Yet, neglecting this hidden problem has the…read more →