Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
3 December, 2019 | Rebecca James

Zero Trust Model: 4 Common Myths Exposed

Whether your IT infrastructure is on premises, in the cloud or hybrid, it is at risk of data breaches. By compromising a single user’s credentials, attackers can breach your organization’s network security and gain access to all the sensitive data the account can reach. The more powerful the...
30 April, 2019 | Brian Svidergol

What is the Principle of Least Privilege?

In this blog post, we will explain the principle of least privilege (POLP), provide the definition and use cases, and explain the importance of the principle. Like many other security principles and concepts, this principle is one part of a larger security strategy that aims at mitigating the risk...