The second of this seven-part series examines the shortcomings of RBAC (role-based access control) models in the face of rapid change
Blog
92 Results Found - Page 3 of 12
If Policy is the New Perimeter, then Attribute-Based Access Controls Make it Possible
The first of this seven-part series traces the evolution of access controls from access control lists (ACLs) to the role based access controls (RBAC) used by most identity solutions.
Ionic Introduces New Machina CLI Tool
Ionic Machina CLI allows developers to quickly create device credentials, create and fetch data protection keys, and set key attributes used by policy rules to control data access.
Accelerating Cloud Adoption with Access Control, Data Security, and Visibility
In the third part of his blog series, Ken Silva, VP of operations and infrastructure, outlines the access controls, data protection, and visibility that professionals like him need to adopt the cloud
Security: The Great Holdup to Cloud Adoption
Ken Silva, VP of operations and infrastructure, believes security has slowed cloud adoption, but, ironically, the thing you fear the most is the thing you should fear the least.
The Simple Path to Securing and Controlling Your Application Data
Learn how to use Ionic Machina to secure and control access to your application data. Whether you’re a software development team lead at a prestigious financial institution assigned to redact personally identifiable information (PII) before releasing the next bankruptcy report, or you’re part of a…
Insider Threat and Supply Chain Risk Reduction – in Real-Time
Ben Halpert, VP of risk and corporate security, reduces the risk of insider threats and supply chain breaches with encryption, consistent policy enforcement, and visibility across technical silos.
Operational Benefits of Google Cloud’s External Key Manager: Privileged Access Management, Use Case Expansion, and Cost Savings
With the release of Machina for Google Cloud EKM, Jimmy Baker, senior director of operations, covers the benefits it offers operational teams: privileged access management, new use cases, and cost savings.