- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![Zero Trust 2.0: NIST’s identity-centric architecture](/sites/default/files/content/blog/field_image/2020-12/zero-trust-neist-identity.jpg)
In August, the National Institute of Standards and Technology (NIST) released its blueprint for establishing a Zero Trust security architecture, NIST SP 800-207. The…
Read More![A Solution to Schrems II and the Security of Transatlantic Data Flows](/sites/default/files/content/blog/field_image/2020-12/a-solution-to-schremes-ii.png)
Five months ago the European Court of Justice ruled that Privacy Shield did not comply with its citizens’ privacy rights. Known as the…
Read More![CPRA Becomes the New Standard. Are You Ready?](/sites/default/files/content/blog/field_image/2020-12/cpra-becomes-the-new-standarad.png)
In the November 3, 2020, election California voters upped the consumer digital privacy ante by passing …
Read More![Mitigating Ransomware Attacks –Decoupling Encryption Keys From Encrypted Data](/sites/default/files/content/blog/field_image/2020-11/mitigating-ransomware-attacks-blog-featured-image.jpg)
While ransomware attacks have been around for decades, their frequency has exponentially increased in the last few years, let alone the past several months during the pandemic…
Read More![Cloud Native Applications are the Trend but what about Cloud Native Security?](/sites/default/files/content/blog/field_image/2020-11/cloud-native-security-blog-featured-image.jpg)
Leveraging DevOps processes, technologies and tools as the means to accelerate business value or experimenting with new ideas and bringing them to market has become mainstream…
Read More![How to Choose the Right Access Management, Authentication and SSO Solution](/sites/default/files/content/blog/field_image/2020-11/how-to-choose-the-right-access-management-blog-image.jpg)
The access management market has been more relevant this year than ever before. The new normal of…
Read More