Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

What Is a Password Vault and How Does it Work?

A password vault is an encrypted digital web vault that stores online login credentials, documents, images and other sensitive information. A password vault gives customers the option to use a single master password that decrypts the vault and provides access to different passwords used for various websites or services.

Vodafone Bundles Lookout with Google Workspace to Protect Small Businesses

Even before working from anywhere became the norm, organizations of every size were already becoming more reliant on mobile devices and productivity apps. But this reliance has also opened users, devices and data up to more risk. This is why we are thrilled to see our friends at Vodafone offering a new bundle for small businesses that brings together Lookout for Small Business mobile security and Google Workspace, a suite of collaboration and productivity apps by Google.

Simplify File Sharing with Egnyte's Outlook Integration

If Microsoft Outlook is your preferred email application, we’ve got some good news for you. We recently released a new integration that simplifies file sharing for both web and desktop versions of Outlook. Without leaving the Outlook interface, Egnyte users can now: You no longer have to add bulky attachments to your emails, which makes it easier to share files with people beyond your corporate network.

What You Need to Know About Fine-Grained vs. Coarse-Grained Authorization

With the growing importance of cloud-native security and zero-trust approaches to software, questions around the level of access granted to cloud resources have become more critical. Equally important is to understand the value of different authorization strategies. In this article, we present an overview of fine-grained and coarse-grained authorization methods.

Aviation Safety and Cybersecurity: Learning from Incidents

The aviation safety sector is the study and practice of managing aviation risks. It is a solid concentration of regulations, legal documents, investigations of accidents and near-miss aviation incidents. On top of them lie lessons learned and shared knowledge; reports, facts and stats forming a cognitive super vitamin, that the aviation community uses to keep their business healthy and safe.

Using XACML with OPA and Rego: The Best of Both Worlds

XACML is an OASIS standard for implementing declarative authorization policy. It was intended to be a widely adopted technology that would move authorization policy decisions out of application code and into a specialized Policy Decision Point (PDP). The terms often used in the OPA world, such as PDP, PIP (Policy Information Point) and PEP (Policy Enforcement Point) all come from the XACML standard. You can read more about XACML in Anders Ecknert’s blog post on architecting authorization.

How do you measure up on the 9 Core Security Capabilities essential for Zero Trust in IoT?

Machine Identities, Zero Trust….how do these relate to your IoT project? Today’s PKI vendors have specific solutions for managing non-human identities – machines – like servers, laptops, software applications, API’s and other assets found within a corporate network.

Meet the Trust Champions that Led BigSpring's SOC 2 Process

What is a Trust Champion? A Trust Champion is the person who helps their organization measure and meet its internal compliance obligations. Their actions support revenue-generating activities, protect their organization from legal and contractual liabilities, and enable the organization to confidently and transparently showcase an intentional, robust, and differentiated culture of trust. Arun Nagarajan – Co-founder & CTO – has led the compliance journey at BigSpring.