Blog Blog

    The Unsudden Death of Group-based Access Control

    Gal Helemski October 18, 2016

    The Unsudden Death of Group-based Access Control

    Gal Helemski October 18, 2016

    In the previous posts, we covered the advantages of dynamic AuthZ and the benefits of ABAC. We found that static authorizations don’t offer as much...

    Read More

    The Root Cause of Most Cyber Attacks? Hint: It’s Not Technology

    Oren Harel September 27, 2016

    The Root Cause of Most Cyber Attacks? Hint: It’s Not Technology

    Oren Harel September 27, 2016

    While we might be quick to blame ineffective security appliances and applications as the reason for today’s high-profile cyber attacks, the reality...

    Read More

    Access Creep, Not Compromised Credentials, is the Biggest Threat in Information Security

    Oren Harel September 19, 2016

    Access Creep, Not Compromised Credentials, is the Biggest Threat in Information Security

    Oren Harel September 19, 2016

    If your company discovers that sensitive data has been compromised, you would assume that hackers have found a vulnerability, gained access and plan...

    Read More