-
AuthorizationUnderstanding and protecting against the rising threat of Whale Phishing
Learn more
Ellen James -
AuthorizationSnowflake security: how to manage and secure data access at scale
Learn more
Kale Bogdanovs -
AuthorizationThe Limits of “Man-in-the-Middle” Architecture for Authorization
Learn more
Rich Dandliker -
AuthorizationIntegrate custom applications into a single control plane for authorization, with Open Authorization API
Learn more
Jim Lester -
Authorization
The Fundamentals of a Data-Centric Approach to Cloud Security
Learn more
Teju Shyamsundar -
Authorization
What is data security?
Learn more
Teju Shyamsundar -
AuthorizationRethinking Data Security with Veza
Learn more
Craig Rosen -
AuthorizationSolving the Long-Tail Integration Problem with an Open Platform Strategy: Meet the Open Authorization API (OAA)
Learn more
Rich Dandliker -
Authorization
The Basics of AWS IAM – Keeping Cloud Expansion Secure with Identity and Access Management for AWS
Learn more
Kale Bogdanovs -
Authorization
Authorization: The Missing Piece of Cloud Security
Learn more
Teju Shyamsundar