When you think of hacking or start looking at ethical hacking and counter measures, the focus […]
Defence in Depth. Rings of Security. Multi-layered protection. All well known terms when it comes to […]
A firewall. An aggressive connotation. A wall, made of bricks and cement, literally on fire. As […]
Many recent software development frameworks use the term “Convention over Configuration”. The main idea behind this, […]
Kuppinger Cole recently had a discussion covering the potential boundaries of standard RBAC and if there […]