Blog

Image
Threat_ATT&CK-Series-Exfiltration_list-476x210_overlay
July 16, 2019

In this post, we will address some of the MITRE ATT&CK’s Exfiltration techniques and tactics, from an attacker’s point of view, that may be used to....

Blog
Image
Threat_Will-the-real-SDP-please-Stand-up_Blog-post-Images-list-476x210
July 10, 2019

The term Software Defined Perimeter (SDP) has recently gained popularity and represents a new and agile way to provide secure access in a Zero Trust....

Blog
Image
Endpoint_testing_list_476x210
June 13, 2019

Endpoint security solution providers continue to race toward the same goal—a multifunctional platform that includes prevention, detection, response....

Blog
Image
Is-your-IDM-Tech-Healthy_list_476x210
June 12, 2019

So, is your IDM programme healthy? If it is built to implement a holistic and strategic vision for identity governance and administration across your....

Blog
Image
IDM_Privacy-Across-the-Pond-Pt2_list_476x210
May 15, 2019

From consumerization to IoT devices to a tax on chardonnay — CTO and Head of Strategy, Andrzej Kawalec and GM and Global Vice President of Digital....

Blog