night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Archive
  • Archive
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Why agnostic access security is critical for compliance in the post Schrems II landscape
Asaf Lerner July 28, 2021
Why agnostic access security is critical for compliance in the post Schrems II landscape

The Schrems II ruling has changed the data protection landscape and introduced new security requirements for the companies wishing to do business with the European Union (EU).…

Read More
The Tokyo Cybersecurity Olympic Games
Chris Harris July 22, 2021
The Tokyo Cybersecurity Olympic Games

The opening ceremony for the delayed 2020 Tokyo Olympics will take place on Friday July 2021, and we can expect to see a very different spectacle, with no spectators present…

Read More
Business as Usual During a Terrible, Horrible, No Good, Very Bad Year
Jennifer Dean July 20, 2021
Business as Usual During a Terrible, Horrible, No Good, Very Bad Year

2020 was a challenging year for the world. With the unprecedented need for workforces to work remotely, companies around the world were put to the ultimate test to keep the…

Read More
Key Developments in IoT Security
Paul Hampton July 15, 2021
Key Developments in IoT Security

Remember the early days of the emergence of Internet of Things (IoT) devices? The rush to market for consumers to enjoy the modern conveniences offered by these devices shocked…

Read More
The 4 tangible benefits of deploying a cloud neutral access security solution
Asaf Lerner July 13, 2021
The 4 tangible benefits of deploying a cloud neutral access security solution

As organizations increasingly migrate their data in the cloud and leveraging cloud-based apps and services, they are faced with new security risks and challenges. Access…

Read More
Hardware-based PKI provides strong passwordless authentication
Yarden Gaon July 8, 2021
Hardware-based PKI provides strong passwordless authentication

PKI and Credential Management Controlling access is at the heart of any enterprise security environment—making sure only those who have the appropriate permissions…

Read More