Sila logo
  • About
  • Capabilities
    • Cybersecurity
    • Data Analytics
    • Integrated Risk Management
    • Software Engineering & Integration
    • Strategy & Transformation
    • Digital & Creative
  • Careers
    • Openings
    • Sila Life
  • Insights
    • Articles
    • Videos
    • News
  • Contact

Cybersecurity

All Articles
Cybersecurity Software Engineering

The Three Leading Practices for Retail Security and Compliance in the Cloud

A secure and compliant cloud will include these three leading practices that ensure retail security that runs secure and is compliant in the cloud.

Cybersecurity

Strengthen Identity With These 6 Practices

Most IAM implementations provide a baseline level of security, including an identity warehouse with master user information and some reporting…

Cybersecurity Risk

Companies Are Waking Up to a Reality Where Consumers Control Their Personal Data

Sila managing directors recently particiapted in KuppingerCole's Consumer Identity World conference. Here are their key takeaways from the conference.

Cybersecurity

Key Considerations for IAM in the Cloud

Embedding mature identity and access management (IAM) practices into every stage of cloud implementation is necessary to address the inherent risks.

Cybersecurity Software Engineering

Build a Secure Cloud that Retains all “ilities”

Architecting a secure and compliant cloud that doesn’t hinder the “ilities” that justify return on investment is one of the key challenges for many.

Cybersecurity Software Engineering

Operating a Cloud Environment that Runs Secure, Stays Secure

Enterprise cloud environment implementations are most effective when they run secure and stay secure.

Cybersecurity

4 Winning Behaviors of an Effective Cybersecurity Strategy

How adaptive and forward thinking is your strategy? Does your risk response account for evolving threats?

Cybersecurity

Cybersecurity Transformation: From Reactive To Proactive To Predictive

Cybersecurity program transformation is not only about making material changes to capabilities that ensure the protection and continuity of…

Cybersecurity

Identity is the New Perimeter Against Attack

Identity is becoming the new bulwark as attack surfaces expand, privileged accounts have more access to data, and unstructured data proliferates.

Cybersecurity Software Engineering

Six Simple Steps to Improve Software Security by Reducing Code Errors

Incremental changes in functional and quality testing can lead to improved software quality and security while also reducing costs.

Cybersecurity

The Death of Passwords and Three Other Trends at the Gartner IAM Summit

If passwords aren’t dead yet then they’re certainly on their deathbed, as a third wave of authentication solutions like analytics and biometrics…

Cybersecurity

Five Ways to Gain Control of Open Source Software and Improve Security

Open Source Software (OSS) already runs on many enterprise networks, but is often improperly managed or rarely included in enterprise software…

  • ← Previous
  • 1
  • 2 (current)
  • Next →
  • About
  • Capabilities
  • Careers
  • Contact
  • Insights
  • Articles
  • Videos
  • News

#shapeyourworld

© Sila Solutions Group