Identity Governance: How to keep the House in Order?
Probably the most convoluted IT practices of all, the Identity Management and Governance is always vulnerable to a security gap. After all, controlling a vast expanse that extends beyond the traditional realm of a datacenter demands careful planning. While spiraling cost issues and inadequate resources often undermine the identity governance approach, the inherent shortcomings are […]
Is your fitness app secure?
While Oliver was jogging down the track and took a halt to adjust his snickers, little did he knew that the fitness app he installed in his smartphone to monitor his heartbeat is being accessed by some malefactor unlawfully. This has happened to thousands of (Oliver)s, due to a security gap at the fitness app […]