night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
B2B IAM in agricultural machinery: Building a seamless and secure future for manufacturers
Serv Brouns
B2B IAM in Agricultural Machinery: Building a Seamless and Secure Future for Manufacturers

As global food demand continues to rise, agricultural machinery manufacturers face growing pressure to modernise and adopt sustainable practices. With an agile B2B identity and…

Read More
The Evolution of Identity and Access Management
Guido Gerrits
The Evolution of Identity and Access Management (IAM)

The evolution of Identity and Access Management (IAM) has been a fascinating journey, shaped by technological advancements, security challenges…

Read More
PSD2 Compliance - Woman Profile Image
Ammar Faheem
PSD2 Regulation and Compliance

The PSD2 directive is a cornerstone of payment legislation in Europe, designed to enhance consumer protection, foster innovation, and create a more integrated and secure…

Read More
Sensitive data in the cloud: How can companies leverage the benefits without risking security?
Thales
Sensitive data in the cloud: How can companies leverage the benefits without risking security?

In an era of increasingly sophisticated data breaches and cyber threats, companies are rightfully concerned about moving sensitive data to the cloud. The benefits of cloud…

Read More
Passkeys - Thumbprint and Key on Computer Chip
Ammar Faheem
Breaking Free from Passwords: Passkeys and the Future of Digital Services

As passkeys offer a more secure and convenient way to authenticate users, it is no surprise that industry experts agree that they will become the standard authentication method…

Read More
The Vital Role of Enterprise Key Management in Disaster Recovery
Jeff Miller
Ensuring Resilience: The Vital Role of Enterprise Key Management in Disaster Recovery

In the fast-paced era where every second counts, robust key management practices are central to successful high availability (HA) and disaster recovery (DR) strategies.…

Read More