Understanding Authentication & Authorization

Learn the Magic Words: Authentication & Authorization

“Open Sesame!” “Abracadabra!” In fairy tales, magic words like these are invoked before the treasure chest unlocks and doors open. In the software realm, we don’t call it “magic”, we call it “authentication” and “authorization”. Authentication is needed to protect access to precious data. Authorization tells you what you can do once you are inside. Continue reading “Understanding Authentication & Authorization”

Facing the regulatory challenge of Centralized Data

In the new world of the European Union’s General Data Protection Regulation (GDPR), organizations that process or store information on EU Data Subjects must comply with new uniform data privacy requirements. Did you know that GDPR requires all information you hold to be centralized? In this article we focus on centralized data, the looming challenges we face, and the solutions to them. Continue reading “Facing the regulatory challenge of Centralized Data”