Securing the Breach, Part 6 – Control Access and Authentication…
Posted on 04 August 2014 by
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Posted on 04 August 2014 by
Learn the best way to control access and the authentication of users in the sixth and final part of our Securing the Breach blog series.
Posted on 26 January 2015 by
By following the three rules outlined in our ebook, organizations can keep their identities, data, applications, and infrastructure safe.
Posted on 19 February 2015 by
The sole entity responsible for the security of the data is YOU—from the moment you take possession of it to the moment it’s deleted. No exceptions.
Posted on 23 February 2015 by
SafeNet solutions now give you the ability to encrypt sensitive workloads in the IBM SoftLayer cloud platform and own and manage your keys
Posted on 05 March 2015 by
A global leader in mapping and location-based services turned to Safenet Virtual KeySecure with SafeNet ProtectApp to provide location-based security services for public and private cloud solutions.
Posted on 07 April 2015 by
On April 22nd, I’ll be presenting at the annual RSA Conference in the Expo Briefing Center on “Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control” (session ID CSV-W02). In this session, I’ll cover the cultural changes that organizations should adopt in order to address the complex issues surrounding data access in the […]