El identity and access management (IAM) es un conjunto de procesos y...

El identity and access management (IAM) es un conjunto de procesos y...
The Uber breach In September, ridesharing company Uber disclosed that hackers...
Soffid We are proud to have been identified as one of the most representative...
Cyberattacks against the retail industry are an ongoing concern. There are a number of factors that make retail systems attractive targets for hackers. Fortunately, there are also effective...
Nowadays, Chief Information Officer are focusing on business outcomes, agility, and improving customer experience through technology. While at the same, streamlining backend operations with...
The Internet enables businesses of all sizes and from any location to reach new and larger markets. In addition, it provides opportunities to work more efficiently through the use of computer-based...
Las amenazas de seguridad en la red están en constante evolución, lo que dificulta mantenerse al día con las últimas tendencias y proteger los datos sensibles de tu empresa u organización. En el post de hoy compartimos las 7 tendencias más importantes en...
El identity and access management (IAM) es un conjunto de procesos y tecnologías que se utilizan para administrar y proteger los datos y recursos de una organización. Se trata de un componente fundamental de la seguridad de la información y es esencial para proteger...
The Uber breach In September, ridesharing company Uber disclosed that hackers had stolen the personal information of about 57 million customers and drivers. The days following the attack were full of speculation around how the attacker – allegedly a 17 year old – was...
Soffid We are proud to have been identified as one of the most representative Identity and Governance Administration vendor; by Gartner in the Gartner Market Guide for Identity Governance and Administration (IGA). According to this Gartner Market Guide for Identity...