CATEGORIES

soffid

Main benefits of privileged access management (PAM)

No one wants a security breach to happen, but the media will be sure to pick it up when it does. By then, it is too late. Millions of dollars in fines or ransom notes later, and with a tarnished marketplace reputation, the company or government agency wishes they had...

The protection of personal data in a teleworking situation

The COVID-19 pandemic has brought about drastic changes at a social level that would have been difficult to imagine a few weeks or months ago. The situation of confinement in which many countries find themselves, with most of the population unable to leave their...

The value of identity

The rapid digitisation across the world in 2020 has paved the way for companies to adopt new models in how they secure and manage the identity of their users. As businesses move from largely reactive measures last year to now putting in place policies and processes to...

Soffid Webinar: IAM and SSO trends shaping the future of security

Leveraging the full potential of a modern IAM platform is the first step towards eliminating your legacy headaches. Today many organizations are looking at cloud based solutions to accelerate their programs, reduce future operational requirements, and future proof...
Compliance. The state of security

Compliance. The state of security

A compliance audit is a comprehensive review and evaluation of a business or organization’s compliance with a voluntary compliance framework (e.g., SOC 2) or a regulatory requirement (e.g., GDPR)....

read more
5 Cyber Security Tips for Remote Working

5 Cyber Security Tips for Remote Working

After the issuance of movement restriction policies by the government to avoid the spread of coronavirus, organizations had no choice but to send people home. Most were in a hurry to get people up...

read more
The value of identity

The value of identity

The rapid digitisation across the world in 2020 has paved the way for companies to adopt new models in how they secure and manage the identity of their users. As businesses move from largely reactive measures last year to now putting in place policies and processes to...