Blog Blog

    The Root Cause of Most Cyber Attacks? Hint: It’s Not Technology

    Oren Harel September 27, 2016

    The Root Cause of Most Cyber Attacks? Hint: It’s Not Technology

    Oren Harel September 27, 2016

    While we might be quick to blame ineffective security appliances and applications as the reason for today’s high-profile cyber attacks, the reality...

    Read More

    Access Creep, Not Compromised Credentials, is the Biggest Threat in Information Security

    Oren Harel September 19, 2016

    Access Creep, Not Compromised Credentials, is the Biggest Threat in Information Security

    Oren Harel September 19, 2016

    If your company discovers that sensitive data has been compromised, you would assume that hackers have found a vulnerability, gained access and plan...

    Read More

    How Do You Authorize: The Old Static Way or the New Dynamic Way?

    Gal Helemski September 07, 2016

    How Do You Authorize: The Old Static Way or the New Dynamic Way?

    Gal Helemski September 07, 2016

    This is the second of a four-part series that looks at the changes in approach to authorization and IAM that businesses need to make if they want to...

    Read More