Top Security Report #1: DNS Top RPZ Hits
Read more
Building an Effective API Security Strategy: Easy If You Have the Right Tools
In their approach to application programming interface (API) security, organizations exposing web APIs must balance ease of access with control. Like the bank robber...
Coinvault, the court case
Today, after almost 3 years of waiting, it was finally the day of the trial. In the Netherlands, where the whole case took place,...
Secure Identity to Protect Your Reputation
Reputation is built on trust – yet the paradox in the age of access is that the only way we can build trust is...
Datentransparenz
Datentransparenz
Digital Guardian ermöglicht Ihnen, den Standort von vertraulichen Daten, den Datenfluss innerhalb des Unternehmens sowie Situationen zu ermitteln, in denen Daten einem...
Tackling Gootkit’s Traps
Gootkit malware uses misleading code to hinder manual research and automated analysis. - Read more
Centrify’s Next Strategic Step Forward with Thoma Bravo
I am pleased as CEO and co-founder of Centrify to announce that Centrify has entered into a definitive agreement whereby Thoma Bravo, a leading...
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework #outlook a{ padding:0;...














