Creating a Secure Application Security Program

Initially, organizations often begin their application security program by testing their applications after the software is developed. This is because most organizations believe that security elements are already embedded in the software development lifecycle and therefore, applications require only regular vulnerability scanning and penetration testing. However, truth be told, application security includes everything mentioned above…

Redefining Cybersecurity Using the Cloud

Cloud computing is a technology that has made life easier for users, it has even made the digital transformation of businesses possible. Cloud computing has enabled infrastructure-as-a-service (IaaS) because it reduces financial burden and allows cost-efficient solutions. According to 2019 Spiceworks State of IT Survey, the year ahead appears to be a significant year of…

The Role of Network Security in a Cybersecurity Team

The Role of Network Security in a Cybersecurity Team

With the increasing dependency on information technology, it is becoming vital to apply security at every aspect of online data and processes. The protection of data integrity is now one of the crucial aspects for organizations to consider. Network security plays a crucial role in preventing and protecting networking infrastructure against unauthorized intrusions. Network security…

Michael Brengs

Identity is Today’s Firewall and a Critical Component of Cybersecurity

Name: Michael Brengs Designation: CRO & Managing Partner Organization: Optimal IdM Topic: Identity is Today’s Firewall and a Critical Component of Cybersecurity Date of Webinar: 26th June, 2019 Time and Location: 9am EST/ 6:30pm IST/ 2pm GMT Speaker Bio: Michael Brengs is a recognized identity management executive with 20+ years of experience deploying identity and…