Customer IAM: driving the digital ‘high street’ forward
The UK high street has been struggling for some time now. Maplin, Toys R Us and New Look went into administration in 2018, and 2019 told a similar story with [...]
Adopting AI: balancing automation with risk management
Artificial intelligence (AI) has already found its way into many mainstream business applications — redefining the modern workplace and unleashing the power of data and automation across a broad range [...]
IAM trends: what can we expect from 2021?
If 2020 taught us one thing, it is that you cannot control everything. Sometimes, no matter how prepared you are, an unprecedented event can throw your entire business completely off [...]
Has 2020 compromised your business’ cyber security?
This year has seen a lot of disruption, and thanks to COVID-19, businesses of all shapes and sizes have faced increased financial pressures. At the same time, we have seen [...]
Debunking seven common cyber security misconceptions
The cyber security industry has grown exponentially over the past decade, with more resources being deployed to counter threats. Yet, a new cyber-attack occurs somewhere on the web every 39 [...]
Risk management: how to secure your AI and machine learning projects
Artificial intelligence (AI) and machine learning (ML) applications have multiplied significantly over the past few years. As they grow in popularity, these tools are increasingly underpinning our everyday lives in [...]
Protecting your company’s intellectual property
Data breaches are a regular feature in the news lately. More often than not, these news stories are concerned with the theft and exposure of customer information. But what about [...]
How is your business’ IT security adapting to the ‘new normal’?
For years, organisations have been trying to get to grips with cyber security and figure out how they can protect their systems and network from a breach. Because the world [...]
Application security development in the cloud
Application security describes protective measures taken at the application level to prevent data or code within the app from being stolen or hijacked. These measures can include both hardware and software, as well as processes [...]
IGA: better integration through advanced automation
The importance of Identity Governance and Administration (IGA) in managing and reducing user access risk is well documented. Yet, despite this, many organisations still rely at least partially on manual [...]
SCADA: keeping your system secure from cyber attacks
SCADA (Supervisory Control and Data Acquisition) is not a specific technology, but rather a type of application that receives operating data about a system to control and optimise it. The [...]
IAM: safeguarding organisations against rising cyber threats
Organisations increasingly recognise Identity & Access Management (IAM) as a key enabler and an essential building block for achieving effective business transformation. But what exactly is it? IAM is a [...]
Applying a zero-trust approach while working from home
By now, many companies have accepted that working from home and remote working are likely to become the new ‘normal’. But that doesn’t necessarily mean their network and systems are [...]
IGA: managing and reducing user access risks
Understanding and being able to measure risk is the first step toward reducing it. For many organisations, the most significant internal risk comes from the vast number of sensitive applications, [...]