Cybersecurity engineering under the Federal Trade Commission

When the Federal Trade Commission (FTC) releases new regulations or changes to existing ones, the implications may not be obvious to the average business or company employees. The FTC and privacy The FTC is a federal agency that protects consumers from… Continue reading Cybersecurity engineering under the Federal Trade Commission

Benefits of modern PAM: Efficiency, security, compliance

Many legacy Privileged Access Management (PAM) solutions are still very manual regarding what they do and how they manage user access and permissions. They are geared toward the human administrator or designed for the data center, making them inadequat… Continue reading Benefits of modern PAM: Efficiency, security, compliance

Mobile app creation: Why data privacy and compliance should be at the forefront

In today’s mobile app landscape, providing customers with the most tailored and personal experience possible is essential to edging out competitors. But creating such a custom-made experience requires collecting personal data – and when con… Continue reading Mobile app creation: Why data privacy and compliance should be at the forefront

APIs in the insurance industry: Accessing a growing world of data

The insurance industry is vast and varied. It can be found in nearly every country in the world, with the earliest references dating back as early as 1750 BC. Modern insurance, however, started around 1686 with Lloyd’s of London and with the U.S. found… Continue reading APIs in the insurance industry: Accessing a growing world of data

Getting your application security program off the ground

IT and security professionals are increasingly concerned about attackers compromising their mission-critical applications. According to a recent Ponemon study, the reasons for that are many: more funds go towards protecting networks, security is not ad… Continue reading Getting your application security program off the ground