Author: hello@tarasovs.me

Resilient IoT Guardian Unveiled to Protect Against Connected Threats

Resilient Network Systems and RunSafe Security Announce Strategic Partnership, New Approach to IoT SecurityMay 31, 2017 09:00 AM Eastern Daylight Time SAN FRANCISCO–(BUSINESS WIRE)–Resilient Network Systems, the contextual access control company, today announced a strategic partnership with RunSafe Security to offer a unique IoT security solution—Resilient IoT Guardian—for both new and existing

The ABCs of GDPR

The ABCs of GDPR Acronyms and abbreviations used to be relegated to those in the military and government: MDA (Missile Defense Agency), USPS (United States Postal Service), RAF (Royal Air Force). But the proliferation of social media sites like Twitter and Snapchat has moved acronyms into the mainstream: IMHO, YOYO,

CLASSIDOCS.COM ANNOUNCES AI FOR DATA CLASSIFICATION

ClassiDocs is making generally available an industry-first Artificial Intelligence for Data Classification – adding to its significant technology and market differentiators for structured and unstructured data sets. “Our labs have been researching for some time different technologies to help organizations approach the ultimate in data classification – classifying all data

IAM Concept of the Week: XACML

Concept of the Week blog series – Every week we define and explain the significance of a concept in the world of Identity and Access Management (IAM). Last week we talked about the importance of context and how it describes the sum of all information or attributes that we can

IAM Concept of the Week: Context

Concept of the Week blog series – Every week we define and explain the significance of a concept in the world of Identity and Access Management (IAM). This week let’s discuss the concept of context. Here at Resilient we believe that fundamentally the more information an organization has about an

The NEW classification 101 – The Why & The How

In this post I will reiterate what we have been presenting to partners, analysts and customers alike – from a ‘why we did this’ perspective to a ‘how we did this’ approach. As covered in the previous post, we built this product primarily out of frustration being a user of

IAM Concept of the Week: RBAC versus ABAC

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week let’s discuss Role-Based Access Control (RBAC) and Attribute-based Access Control (ABAC) – both are popular approaches to determine who can access an organization’s

Engaging the Stakeholders of ECM

Engaging the Stakeholders of ECM Engaging the Stakeholders of ECM In today’s Digital Age, data and information are an organization’s lifeblood: What are the 3Q revenues from our best-selling product? How many workers under age 30 do we employ? How many software licenses in our IT enterprise are set to