Here are some highlights from the OneLogin Halloween party 2017!
Contemporary manufacturing organizations continue to look to cloud technologies to improve agility across their supply chains, improve security, and simplify identity management - all at a reduced cost.
Here is a high-level overview of what Hr-Driven Identity means, and how it’s making our customers’ lives easier.
Watching Jon Snow and his allies prepare their forces for the impending war, I can’t help but see similarities between the defenses of the Night’s Watch and those of cyber security teams in the real world.
Any security expert worth their salt would agree that MFA is a worthwhile investment for keeping data secure. But multi-factor authentication based on static rules is no longer enough. Here’s why.
Happy Sysadmin Appreciation Day, everybody! We’d like to send out a very special thank you to all the unsung sysadmin heroes out there who keep us secure, put out tech fires, and ensure that the world keeps spinning.
Happy Star Wars Day, everyone! In this post, we’ll be breaking down the security blunders that the Empire made in Rogue One: A Star Wars Story. Let’s see what the biggest data breach in the galaxy can teach us about security and compliance.
From a security perspective, we are very concerned about the use of sticky notes in the workplace. Many office spaces are littered with sticky notes with usernames and passwords written on them. You can find them on the sides and bottoms of computer screens, in desk drawers, or even hidden beneath mouse pads and keyboards.
“The security perimeter is dead,” says Forrester Senior Analyst Merritt Maxim. Firewalls may have been the primary security parameter for the enterprise 10 years ago, but those days are long over.
This year’s RSA Conference (RSAC) was huge: 43,000 attendees, 15 keynote presentations, 700 speakers, 500 sessions, and 550 exhibitors. Here are some of our highlights from the conference.