role based access controls

Grant Access to Workflows, Not to Systems or Data

It happens all the time: Employees, departments or even third-party entities request access to business applications so they can perform important tasks. How much access should they be granted - and to which systems and data. Expert Mike Fitzmaurice sheds some light on enterprise application workflow best practices.

Cybersecurity Strategy. It’s Your Move...

Do you have what it takes to win the war on cybercrime? In this Experts Corner, Ajit Sancheti outlines three moves enterprise organizations can take to position themselves for the worst. It's your move.