Category: News

GDPR Compliance Will Impact Physical Access Controls

GDPR
The European Union (EU) General Data Protection Regulation (GDPR) places strict new security and privacy requirements on any data related to persons living in the EU. In documenting and managing such data, organizations should not overlook physical access control systems. As we noted in a previous post, physical security typically falls under the purview of a Chief Security Officer...

Enabling Identity Management for Microservices and Cloud-Native Apps

Clango
Cloud access security brokers (CASBs) enable organizations to extend their internal security policies to cloud-based applications and services. A CASB serves as a sort of gatekeeper, sitting between an organization’s onsite infrastructure and the cloud. It can be deployed as an on-premises software tool or a cloud-based service, and may use proxies or APIs to monitor traffic and enforce...

CyberArk Engineer

Clango Careers
Apply Now!Send your resume and cover letter to careers@clango.com today! Job Description: Clango, Inc. has an immediate opening for a CyberArk Certified Delivery Engineer (CCDE) who is seeking to broaden their skills while collaborating on a multifaceted Cybersecurity team. Initial duties will consist of installing, configuring and patching CyberArk installations for leading financial, healthcare, federal, and infrastructure clients. However,...

Senior Cybersecurity Systems Engineer

Clango Careers
Apply Now!Send your resume and cover letter to careers@clango.com today! Clango has an immediate opening for a skilled systems administrator and network engineer with experience in or looking to move into cybersecurity engineering and architecture. This position is located in Arlington, VA, and will split time between internal security and engineering functions and client work in similar categories. The...

Authentication-as-a-Service Simplifies Single Sign-on and Access Controls

Cloud
The cloud delivers many business benefits, including the ability to preserve capital, offload many IT operational tasks, implement new applications and services quickly, and tap into IT resources that might not otherwise be affordable. Thanks to these benefits, organizations are moving to the cloud in a big way. According to the RightScale 2017 State of the Cloud Report, the...

The Role of Identity Management in Healthcare Security

DIT-healthcare-security
In our last post, we discussed some of the tech trends in healthcare that are having an impact on security. Beyond federal mandates for “meaningful use” of electronic health records (EHRs), healthcare organizations are employing technology tools to better engage with patients who expect to be treated more like customers. This is driving the adoption of monitoring devices, mobile...

Four Healthcare Tech Trends and Their Impact on Security

Healthcare
Though technology is typically viewed as a cost-saving and paper-reducing tool in the healthcare industry, there has been an increased emphasis on using technology to improve patient care and the overall patient experience. Federal law has mandated that healthcare organizations demonstrate “meaningful use” of electronic health records (EHRs) to better engage with patients and their families, coordinate care, and...

EAM: More than Reduced Maintenance Costs

Clango
Enterprise asset management (EAM) is generally used to reduce the operational and maintenance costs of corporate assets. By more effectively coordinating the maintenance of manufacturing plants, vehicle fleets, oil and gas pipelines, and other infrastructure, EAM can also help minimize costly service disruptions. However, the value of EAM can extend beyond the bottom line by enabling organizations to more...

NIST Offers New Guidelines on Identity Management

NIST
The National Institute of Standards and Technology (NIST) is updating its Cybersecurity Framework, as we reported in a previous post. Designed to provide a “prioritized, flexible, repeatable, performance-based and cost-effective approach” to managing cybersecurity, the framework has seen broad adoption by organizations worldwide. NIST issued a draft of version 2.0 in January 2017, incorporating feedback received since the original...

UMA Meets Privacy Requirements by Giving Customers Control Over Their Data

UMA
In our last post we discussed the growing need for customer identity and access management (CIAM) solutions. Like identity and access management (IAM), CIAM has to do with the registration and authentication of users so they can gain secure access to online resources. However, CIAM is also about the aggregation and synchronization of customer data across sales, marketing, and...