Learn how to use Ionic Machina to protect and control access to your application data. Whether you’re a software development team lead at a prestigious financial institution assigned to redact personally identifiable information (PII) before releasing the next bankruptcy report, or you’re part of a…
19 Results Found - Page 1 of 4
Get guidance on which Machina solution in the AWS Marketplace is right for you and review step-by-step instructions on implementing Machina in your environment.
Ionic Founder Adam Ghetti explores Machina for Google Cloud’s External Key Manager and the components of customer-managed trust: automation, consistency, precision, privacy, security, and simplicity.
Ed Amoroso of TAG Cyber wrote an insightful analysis of Ionic Security, focusing on data access policy management that enables enterprise security.
This is an abridged version of a cybersecurity interview Steve Pugh conducted with Aviva Zacks of Safety Detective; you can read the complete interview on their site. As a forward-thinking chief information security officer for Ionic Security, Steve Pugh has taken the lead in deploying a…
When people talk about “shifting left” from DevOps to DevSecOps, they’re emphasizing an appdev mindset. They’re not focusing on the machine-scale data these apps create, and that’s a problem.