The Role of IAM in IOT

“Do you have valid ID?” We are all used to being asked for valid ID to prove who we say we are. From picking up a parcel at the post office, voting in elections or buying wine (if we are lucky enough to look that young), and in many other situations, proving your identity is […]

Veracode And Code Security

It’s almost a decade since Marc Andreessen wrote his influential “Why Software Is Eating the World” article in The Wall Street Journal. In the article he outlined how software systems were, and would continue to, disrupt and replace traditional business models with layers of software and applications on the web and mobile devices. His prediction […]

5 Tips for securing your Wi-Fi

You probably don’t give it much thought, but your wireless network is one of the most important aspects of conducting your day to day business and/or your personal affairs. Most business processes use a wireless network and without it, daily operations would slowly grind to a standstill. As Wi-Fi and internet technology has evolved and […]