Protect What Matters Most: The Data -- Part 2, Data-Centric Security Welcome to Part 2, of Protect What Matters Most: The Data. You can find Part 1 here, if you didn't catch it. A while back, my colleague, Gerry Gebel, and I delivered a webinar on the very topic of data-centric authorization.
Most modern environments today handle large amounts of data. Typically the data is spread across different data sources such as relational databases or even a big data system or data lake. And within these massive data stores, therein lies data that is very sensitive and critical to
Today's blog post is a post from one of our partners, Gluu. The feature writer is Mike Schwartz. He has been an entrepreneur and identity specialist for more than two decades. He is the technical and business visionary behind Gluu. Mike is an application security expert and has been a
How to solve the consistency problem of managing authorization of Single Page Application & .NET Core WebAPI? Question from Stack Overflow User Ishan Akin. We are currently developing a web application that has following architecture. A single page application based on
Introduction Extending the authorization capabilities of an API Gateway to use fine-grained dynamic authorization with the Axiomatics Policy Server is a common use case. There are several different aspects of authorization that are typically applied to API’s: Authorizing whether or not
Patient Enablement / Self-service With respect to health care, a McKinsey report from late 2014 explains that health care IT is evolving at the same speed as other industries, and this will be no different in the future. McKinsey considers that more than 75% of all patients expect to use digital
A week-long cybersecurity event in Luxembourg included Axiomatics’ participation in the PwC Cybersecurity Day last Thursday. Luxembourg City was a terrific host and provided a great setting to highlight the great effort on security topics that this city and country are working on. PwC put
This Use Case, Federal Mission: Dissemination and Information Sharing using Attribute Based Access Control (ABAC), discusses how an ABAC model can be used to disseminate information between agencies widely and securely. By using a fine-grained, ABAC implementation such as Axiomatics Policy Server
Part 1: How to Containerize Containerization is a trend we’ve seen at the enterprise level and among the federal government for some time now. If the term is new to you, here is a simple metaphor that explains why organizations are shifting towards this IT practice: Imagine the struggle of
Patient enablement / self-service With respect to health care, a McKinsey report from late 2014 explains that health care IT is evolving at the same speed as other industries, and this will be no different in the future. McKinsey considers that more than 75% of all patients expect to use digital