The ‘insider’ is the dude in the office.  He (or she) probably works in IT and […]
Privileged Account Management is a major concern to large organisations trying to control the ever growing […]
When you think of hacking or start looking at ethical hacking and counter measures, the focus […]
Defence in Depth.  Rings of Security.  Multi-layered protection.  All well known terms when it comes to […]
A firewall.  An aggressive connotation. A wall, made of bricks and cement, literally on fire.  As […]
Many recent software development frameworks use the term “Convention over Configuration”.  The main idea behind this, […]
Kuppinger Cole recently had a discussion covering the potential boundaries of standard RBAC and if there […]