The ‘insider’ is the dude in the office. He (or she) probably works in IT and […]
Privileged Account Management is a major concern to large organisations trying to control the ever growing […]
When you think of hacking or start looking at ethical hacking and counter measures, the focus […]
Defence in Depth. Rings of Security. Multi-layered protection. All well known terms when it comes to […]
A firewall. An aggressive connotation. A wall, made of bricks and cement, literally on fire. As […]
Many recent software development frameworks use the term “Convention over Configuration”. The main idea behind this, […]
Kuppinger Cole recently had a discussion covering the potential boundaries of standard RBAC and if there […]