The misuse of privileges remains one of the most common causes of data breaches and it is involved in 74% of data breaches worldwide. Singaporean authorities understand the […]

The misuse of privileges remains one of the most common causes of data breaches and it is involved in 74% of data breaches worldwide. Singaporean authorities understand the […]
Axidian Privilege keeps on going in line with the cybersecurity trends. We are committed to continuous product improvement so that our customers enjoy enhanced and user-friendly privileged access […]
Privileged access management is an important part of any cybersecurity policy. With the PAM market predicted to continue rapidly growing in the upcoming years, PAM implementation the #1 […]
When it comes to multi-factor authentication, any cybersecurity officer knows – usability is a must step toward users’ acceptance of the technology. The product will be ignored if […]
Ensuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption and digital signature. Just like any technology, PKI actively evolves and […]
Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of […]
In June 2013, the Monetary Authority of Singapore (MAS) introduced the Technology Risk Management Guidelines, a comprehensive document setting out risk management principles. It contains best practices to […]
There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When […]
The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected […]
For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go […]