In the 1990s, middleware was the muscle that made enterprise computing truly scalable. Before middleware, applications communicated with databases and back-end services directly using drivers like ODBC (Open Database Connectivity) or native SQL calls. This was simple but brittle, used shared secrets, and riddled with risks. It required developers to write custom code for every…
Archives
-
New IAM Cybersecurity and PAM Tools Strategies for Higher Education
In the classroom, universities and colleges are looking towards the future with their curricula, stretching young minds around evolving concepts and advancements. The irony? Behind the scenes, these same institutions are often unprepared for the changes that developing technology brings to their campuses and networks. Recent digital disruptions, such as AI, have exposed the systems…
-
Compliance and Unified Identity Security in Financial Services
With all the sensitive data financial institutions collect, it should come as no surprise that the financial services industry is one of the top targets for cybercriminals. That’s also why compliance with stringent regulations and standards is so important — in fact, it’s essential for doing business. In the interconnected financial landscape, managing multiple point solutions for compliance…
-
Mastering Financial Services Compliance With IAM and PAM
This blog was originally published by Bravura here. Managing data access is an ongoing journey for businesses in the financial services industry. Policies such as the Sarbanes-Oxley (SOX) Act and the Gramm-Leach-Bliley Act (GLBA) establish regulations that your business must follow when implementing any identity access management (IAM) or privileged access management (PAM) tool. Auditors will check your system for compliance…
-
BeIdentitySmart, BeCyberSmart for Security Practitioners
The phrase “a dog is for life, not just for Christmas” was coined by British animal welfare charity Dogs Trust over 40 years ago and still rings true to this day. The same theory must also be applied to securing digital identities in our increasingly turbulent modern business world. It’s all well and good having…