What Is Infrastructure as a Service (IaaS)?

Infrastructure as a service—also known as cloud infrastructure services—refers to a business model where cloud providers host space on their servers for others to store core computing, networking, and other resources. With IaaS, businesses and individual users rent infrastructure for their apps and operating systems on demand.  For organizations…

What is Zero Trust Security?

Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. In a Zero Trust model, people are the new perimeter, and identity is the core of maintaining a secure environment. An evolving landscape Historically, organisations have kept their data…

What is SAML?

From CRMs for salespeople to invoice systems for accountants, the proliferation of SaaS web apps has made life easier for many employees. However, even the adoption of the most productivity-enhancing apps can lead to unintended inefficiencies and risks. These can range from frequent “I forgot my password” calls that inundate the IT department to…

What Is SOC Compliance?

SOC is a set of standards that allow companies to demonstrate they are managing and regulating information properly. SOC stands for “service and organisation controls;” developed by the American Institute of Certified Public Accountants (AICPA), these regulations exist to give companies peace of mind when exchanging customer data with third-party…

What Is Privileged Access Management?

Privileged access management (PAM) is a way of authorising, managing, and monitoring account access with a high degree of administrative permissions. This is done to protect an organisation’s most critical systems and resources. These “super user” accounts are isolated within an encrypted repository or vault. The access of these systems is…

What is WebAuthn?

In March 2019, the World Wide Web Consortium (W3C) announced that WebAuthn is now the official web standard for password-free login. With support from a broad set of applications (Microsoft Edge, Chrome, Firefox, Mobile), widespread adoption of WebAuthn is expected in coming years. In this post, we will explore the shortcomings of current…

What is Authentication? The Ultimate Authentication Playbook

With the rise of credential stuffing and similar attack methods, simple username and password authentication is not enough to deter bad actors.   According to the Verizon Data Breach Investigations Report, there were over 55,000 security incidents and 2,200 confirmed data breaches in 2018, with a whopping 81% of those incidents being tied to…