Blog

How to Prevent External Access to Key Files

How to Prevent External Access to Key Files

Uber, arguably the largest ride-sharing service worldwide, has suffered its fair share of data breaches. A few years ago, the company experienced a leak that exposed over 50 million clients' personal information and data for over 7 million drivers. However, Uber's...

read more
Security Access Control Models for Schools

Security Access Control Models for Schools

This blog will cover multiple aspects of building an access control model based on Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). This includes steps needed to role mine and analyze access permissions across multiple systems, review what...

read more

4 Ways an IAM Solution Can Benefit Healthcare Organizations

It’s no secret that healthcare organizations must adhere to some of the most rigorous data protection regulations out there. The Health Insurance Portability and Accountability Act (HIPAA) puts in place strict rules that healthcare companies must follow to ensure the...

read more

Speak with One of Our Technology Representatives