News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Myths about data encryption
Myths about data encryption

Data encryption is slow, complex, resource-consuming and inconvenient in everyday life. These and other prejudices against data encryption do not correspond to the facts. The need to protect data for legal and compliance reasons is an accepted fact in the business world. Data protection officers and business strategists are aware that this necessity is becoming even more important not only in international business, but also due to distributed working environments and the rapidly increasing use of the cloud in all business areas. The most effective technology to address compliance requirements and cyber risks is to encrypt all sensitive data that the company sends towards...

Read more

Identity Access Management – ​​seven myths
Identity Access Management – ​​seven myths

Remote work and cloud services are increasingly taking important business processes outside of the corporate network. This shift in security perimeters makes cybercriminals more likely to target employees, vendors, and bots. Identity security solutions enable efficient management of user accounts and access policies to meet compliance requirements and minimize the risk of data breaches. Klaus Hild, Principal Identity Strategist at SailPoint Technologies, explains the most common myths and shows which pitfalls need to be avoided to make identity access management (IAM) a success. 1. IAM is a project When introduced…

Read more

Busted: Myths about Zero Trust
Busted: Myths about Zero Trust

In recent years, Zero Trust has become a buzzword for businesses. This often includes on-premises and cloud applications, a hybrid workforce, and a growing set of identities. Time to dispel some myths. It is this new world, in which IT environments and users are increasingly distributed, that is driving the adoption of Zero Trust. Instead of the “castle and moat” approach, where devices are trusted within the network, the model is based on the idea that users and devices should never be trusted by default. However, around Zero Trust there is…

Read more