Blogs

August 29, 2019

Sennovate Insights: Gartner Magic Quadrant in Access Management 2019

Technology providers are present worldwide, but to know who is the best among the vendors is a challenging task for analysts, and for organizations to choose, as each vendor offering will have some features same, some missing and some features added to their product offerings. So how do we figure out who are the leaders […]

Read More
August 26, 2019

Real ID-Compliant – A Must for all Residents

Starting October 1, 2020, every State and Territory Resident will need to present a REAL ID-compliant license/ID or another acceptable form of identification (like a passport or passport card) for boarding commercial aircraft.  This new compliance regulation is based on a law passed after 9/11. A single national standard for all 50 states is being […]

Read More
August 16, 2019

AI Bias And Related Cyber Security Issues

AI systems are on a fast pace, many AI based systems and tools are already emerging or in development stage and soon to hit the market.  The business for AI looks exciting, however there is a dark side which is also emerging  – the fear of ‘bias‘ that is overlooking these AI based systems. Industry […]

Read More
August 11, 2019

DevSecOps – Giving more power to development teams

Today with the increasing number of breaches. Security being the check point for production is quite outdated and time consuming. Though having developers fast drive a secure application is a top priority, it causes many internal conflicts and tons of delay for an application to go live. DevSecOps, a complete new shift in the tech […]

Read More
August 7, 2019

Los Angeles Police Department Faces Data Breach

Data is everywhere and so are the data breaches. With increasing number data breaches every day. The organization takes lots of measures to secure their data and network. Still data breach is increasing day by day. Recently in the last week of July, Los Angeles (LA) police department informed its officers, and applicants who wanted to […]

Read More
August 1, 2019

Centrify Joins Identity Defined Security Alliance (IDSA)

Centrify, a leading cloud provider of Zero Trust Privilege joined several working groups in the Identity Defined Security Alliance (IDSA). The IDSA is an independent industry alliance comprising of leading identity and security vendors, solution providers, and practitioners. The aim of IDSA is to leverage existing cyber security investments to establish a stronger security posture […]

Read More
July 30, 2019

Best Practices with Single Sign-On(SSO); Assess You Organization Readiness

This checklist is designed to offer guidance to decision makers in enterprises, small and mid-tier organizations, government agencies or other organizations to assess single sign-on (SSO) systems, as well for SSO developers to ensure that they have provided is equipped to detect the possibilities of exchanging identification and authentication credentials. This checklist will provide you with: […]

Read More
July 24, 2019

2020 US census – data breaches looms large

As the country is bracing itself for the 2020 census, the census bureau is deploying security measures of two-factor authentication, and encryption to protect potential leaks in data.  However, a few govt agencies opine that the census 2020 will employ new digital technologies like cloud, mobile computing, which might face cybersecurity risks – an attractive […]

Read More
July 10, 2019

Idaptive’s Next-Gen Access Cloud – Based on Zero Trust Model

As technology landscape is changing fast, Artificial intelligence (AI) and machine language (ML), is gaining momentum. IT security vendors are keeping in pace with these trends. A key IT security vendor – Idaptive launched NextGen access (NGA) cloud in line with the AI and ML technologies. A study by Statista projects that businesses will spend […]

Read More
July 2, 2019

Role of Security Assessment in Mergers and acquisitions (M&A)

Due diligence Review (DDR) is critically important component in the M&A process, be it financial numbers or legal/ regulatory obligations with big monetary stakes.  Amidst all these, cyber security continues to be ignored or not even considered during such a M&A. Look at the M&A deal of Yahoo -Verizon wherein the whole deal was cut […]

Read More
June 10, 2019

Fintech Security warnings – being well prepared

With rapid increase in adoption of Fintech, come increased security threats. Newer technologies like Block chain, Artificial Intelligence (AI) in the Financial services industry is not only reducing the manual work but also makes the transaction and services more secure, however the security challenges still remain as both these technologies are at nascent stage rather […]

Read More
May 21, 2019

Rise & Rise of API’s

Application programming interface (API) being the hidden backbone of applications. Developers rely on these API’s to communicate with another software programs or applications. According to a survey findings indicate 69% of organizations expose their API to public and partners, wherein an average of 363 different API’s is being used. Nowadays threats and vulnerabilities are increasing, […]

Read More