night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Key Takeaways from the Thales Data Threat Report
Rob Elliss
Key Takeaways from the Thales Data Threat Report: EME Edition

Organizations in the Europe and Middle East (EME) region face significant challenges. The threat landscape is increasingly complex, regulatory requirements are becoming more…

Read More
Building Security Resilience Against Quantum Threats: Embracing PQC in Five Steps
Shaun Chen
Building Security Resilience Against Quantum Threats: Embracing PQC in Five Steps

The recent announcement by NIST regarding the finalization of post-quantum…

Read More
How B2B IAM helps build business agility
Jose Caso
How B2B IAM helps build business agility

In today’s interconnected business environment, the spotlight often shines on security, especially as organizations face increasing risks tied to human error. Human factors…

Read More
The Importance of IAM in Critical Infrastructure
Haider Iqbal
The Importance of IAM in Critical Infrastructure

Over the past year, the world's critical infrastructure (CI) - including energy, healthcare, finance, communications, manufacturing, and transport - has suffered a constant…

Read More
B2B IAM in agricultural machinery: Building a seamless and secure future for manufacturers
Serv Brouns
B2B IAM in Agricultural Machinery: Building a Seamless and Secure Future for Manufacturers

As global food demand continues to rise, agricultural machinery manufacturers face growing pressure to modernise and adopt sustainable practices. With an agile B2B identity and…

Read More
The Evolution of Identity and Access Management
Guido Gerrits
The Evolution of Identity and Access Management (IAM)

The evolution of Identity and Access Management (IAM) has been a fascinating journey, shaped by technological advancements, security challenges…

Read More