How decentralized identity is shaping the future of data protection

In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in cybersecurity. By redistributing identity management responsibilities among issuers, hold… Continue reading How decentralized identity is shaping the future of data protection

What is Azure AD B2B?

Discover the benefits of using Azure AD B2B in your organization. Learn how it can improve collaboration and streamline access for external partners, and boost your users’ productivity, safely and securely. What is Azure B2B? Microsoft Entra B2B (formerly Azure AD B2B) is a feature/service within the Microsoft Entra ID that allows collaboration between your…

The post What is Azure AD B2B? appeared first on Petri IT Knowledgebase.

Continue reading What is Azure AD B2B?

Enhanced Data Governance: Microsoft Purview Now Supports Scanning Fabric Items

Microsoft has recently added support for Fabric items to its Microsoft Purview service. The new feature allows IT admins to scan a Fabric tenant and view metadata and lineage from Fabric items such as Power BI. Microsoft Fabric is a new end-to-end data and analytics platform built on Microsoft’s OneLake Data Lake. It offers various…

The post Enhanced Data Governance: Microsoft Purview Now Supports Scanning Fabric Items appeared first on Petri IT Knowledgebase.

Continue reading Enhanced Data Governance: Microsoft Purview Now Supports Scanning Fabric Items

What is Azure AD B2C?

Azure Active Directory (Azure AD) B2C is a cloud-based customer identity and access management service that provides business-to-customer (B2C) Identity-as-a-Service. It allows organizations to secure and manage their customer-facing applications – so external parties can seamlessly sign up and log in. Learn more about the features and benefits of Azure AD B2C below. What is…

The post What is Azure AD B2C? appeared first on Petri IT Knowledgebase.

Continue reading What is Azure AD B2C?

How CISOs navigate policies and access across enterprises

In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a distributed enterprise. He also highlights the significance … Continue reading How CISOs navigate policies and access across enterprises

Beyond blockchain: Strategies for seamless digital asset integration

In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, underlining the necessity for a high level of security maturity in handling digital a… Continue reading Beyond blockchain: Strategies for seamless digital asset integration

CISOs’ crucial role in aligning security goals with enterprise expectations

In this Help Net Security interview, Chris Mixter, Vice President, Analyst at Gartner, discusses the dynamic world of CISOs and how their roles have evolved significantly over the years. He outlines the critical skills for CISOs in 2024, addresses the … Continue reading CISOs’ crucial role in aligning security goals with enterprise expectations

Cloud security predictions for 2024

As we reflect on the cybersecurity landscape and the trajectories of threat vectors, it’s evident that we’re on the cusp of a paradigm shift in cloud security. Businesses and cybersecurity professionals must stay abreast of these changes, a… Continue reading Cloud security predictions for 2024

What Is IAM? A Guide to Identity and Access Management

Identity and Access Management (IAM), is a crucial cybersecurity framework that governs and secures digital access to resources. It plays a pivotal role in helping organizations control and secure their digital resources such as apps, files, user identities, permissions, and all other organizational data. IAM also helps ensure the confidentiality and integrity of sensitive information….

The post What Is IAM? A Guide to Identity and Access Management appeared first on Petri IT Knowledgebase.

Continue reading What Is IAM? A Guide to Identity and Access Management

Understanding zero-trust design philosophy and principles

In this Help Net Security interview, Phil Vachon, Head of Infrastructure in the Office of the CTO at Bloomberg, discusses the varying definitions of zero trust among security professionals and companies, emphasizing its broad design philosophy. Vachon … Continue reading Understanding zero-trust design philosophy and principles