Actionable IAM insights straight to your inbox
One email. Every month.
Thanks for subscribing!Our best news and stories will be dropped in your inbox every month.

What is compliance management?
Cyber threats and attacks have been all over the world, and to get into fight or flight every time an attacker throws a breach or any attack at you is too much of a pickle. You'll end up losing your data and money, not to forget- your sanity. You will also have to rebuild your documents and other data.

Understanding incident management
It's Monday, 9 am. You're off to work and you think of withdrawing some cash before you check in. You grab a good coffee from your favourite barista, and you're off to the ATM. You're standing in front of the ATM machine, swiping your card, hoping to get some cash.


5 simple steps to HIPAA compliance
The Health Insurance Portability and Accountability Act (HIPAA) is a set of regulations designed to protect the privacy of patients’ health information. If your business deals with any kind of protected health information (PHI), then you need to be HIPAA-compliant.





NIST password guidelines: Bolstering password security
Weak, repetitive, and recycled old passwords can be easily exploited by threat actors, leaving organizations vulnerable to data breaches.Thankfully, the National Institute of Standards and Technology (NIST) has released guidelines to help organizations bolster their password security.
Your search hit a wall... a firewall, perhaps? While our IAM experts are currently in 'Do Not Disturb' mode, crafting content. Bookmark us and swing by later!