night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
How B2B IAM helps build business agility
Jose Caso
How B2B IAM helps build business agility

In today’s interconnected business environment, the spotlight often shines on security, especially as organizations face increasing risks tied to human error. Human factors…

Read More
The Importance of IAM in Critical Infrastructure
Haider Iqbal
The Importance of IAM in Critical Infrastructure

Over the past year, the world's critical infrastructure (CI) - including energy, healthcare, finance, communications, manufacturing, and transport - has suffered a constant…

Read More
B2B IAM in agricultural machinery: Building a seamless and secure future for manufacturers
Serv Brouns
B2B IAM in Agricultural Machinery: Building a Seamless and Secure Future for Manufacturers

As global food demand continues to rise, agricultural machinery manufacturers face growing pressure to modernise and adopt sustainable practices. With an agile B2B identity and…

Read More
The Evolution of Identity and Access Management
Guido Gerrits
The Evolution of Identity and Access Management (IAM)

The evolution of Identity and Access Management (IAM) has been a fascinating journey, shaped by technological advancements, security challenges…

Read More
Sensitive data in the cloud: How can companies leverage the benefits without risking security?
Thales
Sensitive data in the cloud: How can companies leverage the benefits without risking security?

In an era of increasingly sophisticated data breaches and cyber threats, companies are rightfully concerned about moving sensitive data to the cloud. The benefits of cloud…

Read More
The Vital Role of Enterprise Key Management in Disaster Recovery
Jeff Miller
Ensuring Resilience: The Vital Role of Enterprise Key Management in Disaster Recovery

In the fast-paced era where every second counts, robust key management practices are central to successful high availability (HA) and disaster recovery (DR) strategies.…

Read More