Select Category
Select Year
- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
Protecting the Crown Jewels: The evolution of security strategies and asset protection
Do you know what takes place at the Ceremony of the Keys at the Tower of…
Read More
Regional privacy but global clouds. How to manage this complexity?
The UN Fundamental Declaration of Human Rights states: “No one shall be…
Read More
What is Digital Sovereignty and Why is it Important in a Cloud Environment?
Last week, I had the opportunity to attend the Google Cloud Security Summit digital event and share how…
Read More
Access Management is Essential for Strengthening OT Security
We have reached the point where highly connected cyber-physical systems are the norm, and the lines between information technology (IT) and operational technology (OT) are…
Read More
Does the future of CIAM rely on identity fabrics or an identity suite?
Organizations are forced to fully embrace digital transformation if they want to achieve a sleek customer experience and retain their competitive advantage. The role of digital…
Read More
RSA Conference 2022 Back to Physical - The Thrill of Meeting in Person!
And just like that, RSA Conference 2022 is back in San Francisco! However, the event will also be online for…
Read More