Tag: Iam

Self-sovereign identities: Whose life is it anyway?

February 1, 2024   |   Steve Prentice

The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In 2023, the unfettered expansion and acceleration of internet technologies crashed headlong into the generative abilities of  AI, leaving people struggling with the concept of what… Read more →

Best Practices For Companies Implementing IAM

January 10, 2023   |   Farwa Sajjad

The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Identity and access management has emerged as an essential security element for organizations. A study reveals that 80% of global IT decision-makers have already adopted or are… Read more →

Have you ever heard the saying that the greatest benefit of the cloud is that limitless resources can be spun-up with just a few clicks of the mouse?  If so, you would be best served by forgetting that saying altogether.  Just because cloud resources can be spun-up with a few clicks of the mouse does not mean that… Read more →

11 Cybersecurity investments you can make right now

October 27, 2022   |   Anas Baig

This blog was written by an independent guest blogger. The average cost of a data breach will continue to rise, which means companies need to start planning accordingly. To protect your business, you need to invest in cybersecurity. Here are 11 areas you should focus on. Cyber insurance Cyber insurance is designed to protect businesses from the financial repercussions of a… Read more →

This blog was written by an independent guest blogger. Despite the ongoing rise in social engineering attacks, the idea that cybersecurity is only about technology manifests within most of our minds. Organizations often neglect human behavior's impact on their cybersecurity postures. Instead, they spend lavishly on endpoint security tools, threat hunting programs, and building incident response plans. Admittedly, these… Read more →

Featured resources

 

 

2024 Futures Report