The modern world runs on a web of connections. Our supply chains are vast and complex, from the software we use daily to the parts that build our […]
The modern world runs on a web of connections. Our supply chains are vast and complex, from the software we use daily to the parts that build our […]
This article from Axidian explains why Privileged Access Management (PAM) is central to MAS compliance, who privileged users are, and how to build a roadmap toward secure implementation.
Axidian Privilege 2.10. is now available: Now in addition to Active Directory and FreeIPA, Axidian Privilege supports OpenLDAP and ALD PRO directory services. Another important update introduces Ad […]
This PAM implementation guide explains who privileged users are, how to assess the need for PAM, what departments initiate adoption, and which technical and business criteria matter most when selecting a solution.
Axidian introduces Axidian Privilege 2.9. Now you can select FreeIPA directory service as a user directory. This means that now Axidian Privilege can be installed not only on […]
Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.8. Migration to .NET 6 Axidian Privilege 2.8 is now powered by .NET 6, the latest version of […]
The Central Bank of Bahrain (CBB) has several rulebooks that outline the regulatory framework for financial institutions operating in Bahrain. These rulebooks serve as a comprehensive set of […]
Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.7. The new release features multiple innovations. For example, it can be partially installed on Linux and supports […]
Cyber Security World Asia returned this year and was held on 12th – 13th October 2022 at Marina Bay Sands, Singapore. The event gathered cyber security professionals and […]
Privileged access is still the main target for cybercriminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known fact that […]