New cloud connectors for S3, GCS and Azure enable developers to protect and control access to data stored in the cloud.
85 Results Found - Page 2 of 15
The second of this seven-part series examines the shortcomings of RBAC (role-based access control) models in the face of rapid change
The first of this seven-part series traces the evolution of access controls from access control lists (ACLs) to the role based access controls (RBAC) used by most identity solutions.
Ionic Machina CLI allows developers to quickly create device credentials, create and fetch data protection keys, and set key attributes used by policy rules to control data access.
Doug Bleszinski, VP of worldwide sales, discusses how as-a-service solutions address security problems like app modernization and new privacy regulations. He also shares his love of hockey and being a #dancedad.
In the third part of his blog series, Ken Silva, VP of operations and infrastructure, outlines the access controls, data protection, and visibility that professionals like him need to adopt the cloud