IDMSaaS. How it Works and Which Problems it hasThe origins of a shared resource environment such as cloud computing date back to the 1960’s. In a 1961 speech to MIT students, John…4 min read·Sep 6, 2018----
IDMData Protection Regulation in CanadaThe priority for safety of private information was a major concern long before the digital age. More often than not, governments prefer to…4 min read·Sep 3, 2018----
IDMData Protection Regulation in JapanThe priority for safety of private information was a major concern long before the digital age. More often than not, governments prefer to…5 min read·Aug 27, 2018----
IDMData Protection Regulation in ChinaThe priority for safety of private information was a major concern long before the digital age. More often than not, governments prefer to…5 min read·Aug 20, 2018----
IDMGDPR: Everything you Need to KnowWe already published an article explaining the European development of data protection. This week we want to explain key points about EU…4 min read·Aug 13, 2018----
IDMTypes of Cloud ServicesCloud computing has three most common types of cloud services to offer. Depending on the needs of users, any type of cloud computing…3 min read·Aug 9, 2018----
IDMHistory of Data BreachesData breaches now make regular news headlines. It wasn’t always so. It’s important to understand the history of data breaches because that…3 min read·Aug 6, 2018----
IDMMain Cloud Security ThreatsCloud computing continues to transform the way companies use, store, and share data, applications, and workloads. It has also introduced a…3 min read·Jul 30, 2018----
IDMData Protection in the U.S.The priority for safety of private information was a major concern long before the digital age. More often than not, governments prefer to…4 min read·Jul 27, 2018----
IDMData protection history #1: European DevelopmentThe priority for safety of private information was a major concern long before the digital age. More often than not, governments prefer to…3 min read·Jul 16, 2018----