Using authorization lists offers many advantages for those people charged with maintaining system and data security.
By Rafael Victória-Pereira
A well-structured authorization scheme that includes both user groups and authorization lists by application or library type allows for better control over the whole system, thus preventing unpleasant surprises and reducing the unauthorized-access risk.
Token Manager from nuBridges substitutes format-preserving tokens for sensitive data.
By Chris Smith
The number of electronic security breaches in the past year has climbed at a rate that makes one question whether moving to cloud computing at this time really make sense. Breaches during the past year exceeded that of the previous four years combined, and if that rate continues, the public will likely lose all faith in a company's ability to protect sensitive data--if it hasn't already.