news reporter

Blog : Tech

Insights and deep-dives into dynamic authorization, attribute-based access control, and modernizing your approach to cybersecurity.

Filter by topic
Select a topic:

Using the Spring PEP SDK with Spring Boot & Thymeleaf for UI Security

Intro to Attribute Based Access Control (ABAC)

Securing Cloud Infrastructure with Dynamic Authorization

Video Blog: Authorization Made Simple: Secure Applications with ALFA, REST, and JSON

Axiomatics and Saviynt Partnership Brings Externalized Dynamic Authorization and Identity Governance and Administration Solutions Together

The Build vs Buy Decision

Executive Spotlight: Interview with Erika Boije, VP Engineering at Axiomatics

The Power of Data Filtering

An Opportunity to Rebuild Customer Trust and Ensure Data Loyalty: GDPR

Video Blog-Moving Beyond Identity-Based Access Control

IAM: The Glue That Holds It All Together

Top Federal Government Security Trends for 2018

Applying ABAC to Cloud Technologies

They Wrote the Book on ABAC

Filter Data with Tableau Using Axiomatics SmartGuard for Big Data

How Commercial Off-the-Shelf (COTS) Applications Can be Supported with XACML

How to Write Authorization Policies for Big Data

Marking the 10-Year Anniversary of the First XACML Interoperability Demo

Leveraging Splunk to Aggregate Axiomatics Policy Server Log Data

How Dynamic Authorization Can Support GDPR Compliance

The Convergence of Personalization and Authorization

How can many complex permit rules for the same XACML policy be managed?

Obligations and Advice in XACML part 2