Our Latest Blog

A place to update data security events and breaking industry news.
The Importance of IAM in Critical Infrastructure
September 12, 2024
Over the past year, the world's critical infrastructure (CI) - including energy, healthcare, finance, communications, manufacturing, and transport - has suffered a constant barrage of attacks.
The Evolution of Identity and Access Management (IAM)
September 5, 2024
The evolution of Identity and Access Management (IAM) has been a fascinating journey, shaped by technological advancements, security challenges, and evolving business needs.
Sensitive data in the cloud: How can companies leverage the benefits without risking security?
September 3, 2024
In an era of increasingly sophisticated data breaches and cyber threats, companies are rightfully concerned about moving sensitive data to the cloud.
Ensuring Resilience: The Vital Role of Enterprise Key Management in Disaster Recovery
August 28, 2024
In the fast-paced era where every second counts, robust key management practices are central to successful high availability (HA) and disaster recovery (DR) strategies.
The Surge of Identity and Access Management (IAM): Unveiling the Catalysts
August 28, 2024
The domain of Identity and Access Management (IAM) has undergone a remarkable surge, underpinned by a myriad of factors spanning technology, regulatory dynamics, and security imperatives.
How Cybersecurity Can Save Critical Infrastructure
August 20, 2024
Critical infrastructure (CI) has become a prime target for malicious actors seeking to manipulate, disrupt, or undermine the operation of industrial control systems (ICS).
OCI Customers Can Now Externally Manage Encryption Keys from a Cloud-Based Service
August 8, 2024
The organizations can use our CipherTrust DataSecurity Platform as a Service with Oracle Cloud Infrastructure (OCI).
Keeping it Local and Secure: Data Sovereignty in a Cloud-Driven World
August 8, 2024
Data Sovereignty: Your Data, Your Regulations.
Passkeys and The Beginning of Stronger Authentication
February 2, 2024
How passkeys are rewriting the current threat landscape.

/ Try It now

Wherever your data resides we can help you own your data

Get a Demo