Aug 11, 2021 | Uncategorized
So-called “FinTech” firms are shaking up the financial services industry with new approaches to solving old problems. But new companies still have to play by the old rules, including financial industry regulations for monitoring user entitlements and access.Here’s...
Jun 23, 2021 | Uncategorized
The Healthcare law is mostly known for its data privacy provisions. But HIPAA has a lot to say about monitoring user entitlements. Here’s a review. Every industry is under pressure to protect its confidential data these days. But the pressure to protect data is...
May 18, 2021 | Uncategorized
NetFlix isn’t just your favorite video streaming service. It is also a powerful development shop and technology “first mover” on many fronts – cyber security and privacy among them. That’s why the folks at Zilla have taken a particular interest in a new tool...
May 12, 2021 | Uncategorized
Deepak Taneja, the CEO and Co-Founder of Zilla and Paul Roberts, Editor-in-Chief, The Security Ledger, recently hosted a webinar to look at how organizations can secure cloud access with automated reviews of user and API entitlements. The webinar is now available for...
May 11, 2021 | Uncategorized
A new adage is emerging in the cloud security world that context is the new perimeter. If you believe this, and there is every reason to believe it, then it begs the question – Where is this context? Why has the shift to the cloud made context so much more...
Apr 26, 2021 | Uncategorized
Understanding cloud user access is about a lot more than cloud users. Here’s what you need to know. Even before the COVID 19 came on the scene, digital transformation was accelerating across industries. Now, a year later, the global pandemic has put those...