Access compliance for FinTech start-ups: What to know

Access compliance for FinTech start-ups: What to know

So-called “FinTech” firms are shaking up the financial services industry with new approaches to solving old problems. But new companies still have to play by the old rules, including financial industry regulations for monitoring user entitlements and access.Here’s...
What you need to know about HIPAA access reviews

What you need to know about HIPAA access reviews

The Healthcare law is mostly known for its data privacy provisions. But HIPAA has a lot to say about monitoring user entitlements. Here’s a review. Every industry is under pressure to protect its confidential data these days. But the pressure to protect data is...
Context is the new perimeter

Context is the new perimeter

A new adage is emerging in the cloud security world that context is the new perimeter. If you believe this, and there is every reason to believe it, then it begs the question – Where is this context? Why has the shift to the cloud made context so much more...
Cloud access risks: What you need to know

Cloud access risks: What you need to know

Understanding cloud user access is about a lot more than cloud users. Here’s what you need to know. Even before the COVID 19 came on the scene, digital transformation was accelerating across industries. Now, a year later, the global pandemic has put those...