Access Control has been around ever since there has been the need to protect valuable assets. Sentries were posted and moats were built. Still, history is littered with access breaches, many of which, such as the Trojan horse, have gone down in folklore. Comparably, data access control is still in
Over the past 20 years the IT road map has changed beyond recognition. Cloud computing, smartphones and online services are part of our daily routines. Until now however, access control has been predominantly managed with a static, antiquated model, namely Role Based Attribute Control, or RBAC. The
How ABAC Can Help Protect IP and Speed Time-To-Market. Manufacturers face unique challenges when it comes to data protection. With digital transformation upon them, many manufacturers are literally awash with terabytes of data that needs storing, mining - and equally important - safeguarding.
The 2016 Cloud Identity Summit is fast approaching and we’re a sponsor of the show this year. As a long-term partner of Ping Identity, we’ve witnessed Identity and Access Management become a dominant area within information security. We’re happy to see this year’s event focuses on the
In this blog post we will present 5 burning issues within the financial services industry and how Attribute-Based Access Control can help tackle some of the access control challenges faced in the financial services industry. How much is fraud reduction worth to your business? Each year,
Over the past 20 years, the IT road map has changed substantially. Cloud computing, smartphones and online services are part of our daily routines. And access control has been predominantly managed with a role based access control approach - which is proving to be static and thereby not adequate
If you store or process medical records you have a target on your back The health care industry suffers 340% more security incidents and attacks than the average industry, while health companies are more than 200% more likely to encounter data theft*. To put some numbers to this, PwC recently
If you share European citizens’ personal data with the US or across European jurisdictions and you don’t have a contingency plan in place, you need to act quickly. The US and EU are working the evolution to Safe harbor by the end of January 2016, you could be deemed
Whether it’s via a mobile, laptop or desktop, in the cloud or on the ground, APIs have become the defacto method for connecting people with data. This is great news for users: access is much smoother and often instantaneous. But for administrators controlling sensitive data, and in particular
Mycroft Inc. is an innovative cyber security and IT governance service provider. Key areas include Identity & Access Management, Governance, Risk & Compliance, Managed Security Services and Data Protection. Mycrofts™ cloud-based security offerings provide controls-compliant and