Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

IAM Concept of the Week: Context

Concept of the Week blog series – Every week we define and explain the significance of a concept in the world of Identity and Access Management (IAM). This week let’s discuss the concept of context. Here at Resilient we believe that fundamentally the more information an organization has about an

Read More >

The NEW classification 101 – The Why & The How

In this post I will reiterate what we have been presenting to partners, analysts and customers alike – from a ‘why we did this’ perspective to a ‘how we did this’ approach. As covered in the previous post, we built this product primarily out of frustration being a user of

Read More >

IAM Concept of the Week: RBAC versus ABAC

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week let’s discuss Role-Based Access Control (RBAC) and Attribute-based Access Control (ABAC) – both are popular approaches to determine who can access an organization’s

Read More >

Engaging the Stakeholders of ECM

Engaging the Stakeholders of ECM Engaging the Stakeholders of ECM In today’s Digital Age, data and information are an organization’s lifeblood: What are the 3Q revenues from our best-selling product? How many workers under age 30 do we employ? How many software licenses in our IT enterprise are set to

Read More >

New Phishing Wave Targets Online Banking and Digital Payment Customers

Cyren researchers are seeing a new phishing technique targeting online banking users from Wells Fargo, Chase and Capital One, along with digital payment customers from Paypal and Venmo, among others. This new wave of phishing attacks builds on previously known techniques. Phishing email attachments, for example, rely relying on email

Read More >

IAM Concept of the Week: Authentication versus Authorization

Introducing our new Concept of the Week blog series – Each week we’ll define and explain the significance of a concept in the world of Identity and Access Management. This week’s post is short but involves two critical and related terms: authentication and authorization. These terms are frequently confused mainly

Read More >