While providing software applications using the software-as-a-service (SaaS) model is not as easy as 1-2-3, the journey to becoming a SaaS provider did provide three primary lessons that all solution ...
Web applications are the top vectors attackers use to pull off breaches. According to Verizon's "Data Breach Investigations Report" (PDF), Web applications were the way in for roughly 70% of all ...
The ‘consumerisation of the enterprise’ is a term quickly gaining traction – but what does it mean and why does it matter? It has become a banner for topics as far-reaching as BYOD, hardware ...
In many respects the breach trends of 2013 have borne out some good news for the security industry. Unlike the past four to five years, this one has not been awash with mega database breaches of tens ...
Successfully applying for Letters of Authorization can be a daunting task. The challenge starts when you try to unravel which LOAs you need, and it continues when you try to gather all the documents ...