36 search results
Article
Application Security
Top 10 Identity Access Management Tools
With cybersecurity systems needed now more than ever, Cyber Magazine considers some of the top Identity Access Management (IAM) tools to protect businesses

Article
Network Security
The crucial importance of IAM in a hybrid working world
With hybrid work is more common than ever, IAM is a crucial framework for protecting data, ensuring compliance, and optimising operations

Article
Cyber Security
Cybersecurity distributor Distology acquires Squareball
The new partnership will bolster Distology’s European proposition thanks to Squareball’s design and implementation of IAM/CIAM solutions.

List
Cloud Security
Top 10 companies providing enterprise cloud security
Cyber Magazine looks at a selection of the world’s leading providers of cloud services and the security operations that keep them safe in a dangerous world

Article
Cyber Security
74% of IT decision makers have no functioning API strategy
New research from open-source technology provider WSO2 reveals where organisations are floundering to successfully digitise services.
