night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Archive
  • Archive
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Tammy Wood Social Card
Tammy Wood March 31, 2022
Azure AD and Thales support for CBA authentication reflects the growing value of high assurance MFA

To help protect the United States from increasingly sophisticated cyber threats, the White House issued Executive Order (EO) 14028 in May 2021 to modernize Federal Government…

Read More
How to Prevent and Protect Against Supply Chain Attacks
Danna Bethlehem March 30, 2022
How to Prevent and Protect Against Supply Chain Attacks

Recent high profile attacks show that the bad guys don’t hack into organizations, they simply log in. This is especially true of supply chain attacks where credential…

Read More
Asaf Lerner Social Card
Asaf Lerner March 29, 2022
Is the Future of Digital Identity Safe?

The pandemic has not only significantly accelerated digital transformation in all industries. It has further established digital services as one of the foundational pillars of…

Read More
Todd Moore Social Card
Todd Moore March 24, 2022
Shifting Risk and Business Environment Demand creates a Shift in Security Strategies

As the world is slowly returning to pre-pandemic conditions, the underlying trends that have always driven information security, such as new technologies, greater compliance…

Read More
What is digital sovereignty and how can you achieve it in the cloud
Rob Elliss March 22, 2022
What is digital sovereignty and how can you achieve it in the cloud?

According to the world economic forum, digital sovereignty refers “to the…

Read More
Enhance your security posture  by detecting risks on authenticator devices
Philippe Allard March 17, 2022
Enhance your security posture by detecting risks on authenticator devices

Numerous attacks due to compromised mobile devices Mobile device usage has become crucial to business agility and productivity for years but the number of compromised…

Read More