DZone Feature: How to Create and Maintain Database Security Using Dynamic Authorization

With organizations now relying so much on data, they should look towards a fine-grained policy-based approach to control access to critical information. By Gerry Gebel We are living in a data-driven world where organizations rely on data for virtually everything. Businesses across every vertical have become reliant on data for day-to-day business operations by collecting […]

ReadITQuik Interviews Niklas Jakobsson, Axiomatics CEO

This week, read Niklas Jakobsson, CEO at Axiomatics talk about security services organizations should use to access data and resources and how the first line of protection should always be based on Attribute Based Access Control (ABAC) – a platform that can turn collaboration into a competitive advantage by enabling individuals within an organization to […]

Axiomatics Federal, Inc. Unveils Top Federal Government Security Trends for 2018

DevOps, Information Dissemination, Safeguarding Sensitive Data and Data Monitoring Dominate Federal Security Practices in 2018 RESTON, VA (February 6, 2018) – Axiomatics Federal, Inc., the leader in fine-grained dynamic authorization for customers and partners of the federal government, today released its inaugural federal security update covering the latest trends and challenges for federal security agencies […]

CSO Online Feature: Using Dynamic Authorization to Navigate GDPR

With less than five months until the implementation of GDPR, organizations are scrambling to comply with the strict data security standards. by Gerry Gebel. This article originally appeared in CSO Online.  The implementation of the General Data Protection Regulation (GDPR) in the EU will impact hundreds of thousands of businesses globally. GDPR imposes a significant […]

VMBlog Feature: 2018 Predictions, What’s to come in Enterprise Security

What’s to come in Enterprise Security by Gerry Gebel Every year enterprise security is evolving to deal with newer, more sophisticated security threats. In 2017, we saw many organizations adopt big data technologies, begin to move toward a microservices approach to break down large applications and work toward scalable compliance with new and changing regulations. […]

DZone Feature | Cybersecurity: The Do’s and Don’ts

In this post, we take a look at what security and dev teams should both do, and not do, to create a security-friendly environment. By Gerry Gebel | Security Zone · Opinion Security is the responsibility of all of us. Given the visibility and public disclosure that results from cyberattack breaches, cybersecurity and enterprise readiness have become […]