Data Management
ABAC vs RBAC: How to create data security, avoid permission creep
Attribute-based access control uses a range of attributes to make decisions.
Security
How can you create data-centric zero trust?
Zero trust typically focuses on context and behaviour, integrating numerous security, identity and monitoring services that reference contextual policies.
Enterprise
How can you simultaneously enhance and secure Microsoft Teams?
The Teams environment is about much more than video meetings. It's likely to become the central point for many engagements in hybrid and remote workplaces.
Business
Balance security and collaboration with dynamic information barriers
Today's dynamic workplaces need dynamic information barriers if they want data and communications to flow freely and securely.