night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Why agnostic access security is critical for compliance in the post Schrems II landscape
Asaf Lerner
Why agnostic access security is critical for compliance in the post Schrems II landscape

The Schrems II ruling has changed the data protection landscape and introduced new security requirements for the companies wishing to do business with the European Union (EU).…

Read More
The Tokyo Cybersecurity Olympic Games
Chris Harris
The Tokyo Cybersecurity Olympic Games

The opening ceremony for the delayed 2020 Tokyo Olympics will take place on Friday July 2021, and we can expect to see a very different spectacle, with no spectators present…

Read More
Business as Usual During a Terrible, Horrible, No Good, Very Bad Year
Jennifer Dean
Business as Usual During a Terrible, Horrible, No Good, Very Bad Year

2020 was a challenging year for the world. With the unprecedented need for workforces to work remotely, companies around the world were put to the ultimate test to keep the…

Read More
Key Developments in IoT Security
Paul Hampton
Key Developments in IoT Security

Remember the early days of the emergence of Internet of Things (IoT) devices? The rush to market for consumers to enjoy the modern conveniences offered by these devices shocked…

Read More
The 4 tangible benefits of deploying a cloud neutral access security solution
Asaf Lerner
The 4 tangible benefits of deploying a cloud neutral access security solution

As organizations increasingly migrate their data in the cloud and leveraging cloud-based apps and services, they are faced with new security risks and challenges. Access…

Read More
Hardware-based PKI provides strong passwordless authentication
Yarden Gaon
Hardware-based PKI provides strong passwordless authentication

PKI and Credential Management Controlling access is at the heart of any enterprise security environment—making sure only those who have the appropriate permissions…

Read More