Encryption on Steroids – Attribute Based Access Control (ABAC)
How many data breaches need to occur before companies take [...]
What will data-centric security look like over the next 5 years?
As we inch closer to the end of the decade, [...]
NextLabs included in Gartner research on data-centric security architecture
Gartner recently published Technical Professional Advice on “How to Successfully [...]
Identity and Security Go Hand in Hand
We’re in the midst of a key paradigm shift when [...]
Upcoming Webinar: Next Generation Security Considerations for SAP
SAP security requirements are becoming increasingly complex. Security threats, data [...]
NextLabs Deepens Its Microsoft Support
In keeping with our extensive support for Microsoft applications, NextLabs [...]
Words of Wisdom: How to Ensure a Successful ABAC Implementation
Attribute-based access control (“ABAC” for short) has reached the point [...]
Could Your Car Be Hacked? It’s More Possible Than You Think.
When you’re driving your car, you view it as something [...]
A Sensible Approach to DRM and File Sharing Services
Many of us use cloud services like Box, Dropbox, Google [...]
GDPR: A Lens into the Bigger Picture of Digital Transformation
The General Data Protection Regulation (GDPR) has been receiving much [...]