App Security in a Direct-to-Cloud Model
(Forcepoint, 2019)  Everyday more organisations embark on a ‘direct-to-cloud’ path.  This can lead to improvements in performance, operations and cost[...]
Adding Context to Trust – An Approach that Helps Protect Critical Data
(Forcepoint, Oct 2018)  Let’s be clear:  organisations today face real challenges protecting critical data. And it isn't just obvious targets,[...]
Viewing Security through an Identity Lens
(SecureAuth, Nov 2018)  I have always been amazed that Superman became unrecognizable as soon as his alter ego Clark Kent[...]
Guide to Cloud Compliance Policy
(Forcepoint, Oct 2018)  The promises of the cloud include enhanced collaboration, easier access to information, and reduced cost and complexity. [...]
A Six Step Process for Pen Testing with Core Impact
(SecureAuth, Sept 2018) When conducting a pen test, most testers will develop some type of process. And they'll use process[...]