Applications Security White Papers & Business Cases


Identity and Access Management

How to manage fined-grain permissions in your business applications
This document looks at identity management and access control (IAM) inside applications. It contains recommendations for those in charge of conceiving access control systems, organizing access rights and administering applicative security on the long term.

3 Reasons to "Close All Doors"

Why YOU need to abide by the Principle of Least Privilege.
Most people remember to secure against external threats, but what about the security of internal data in your applications?

Fight Password Fatigue

Password fatigue is the phenomenon of feeling overwhelmed by the need to remember all of them. To combat this, many users have found coping strategies that undermine the security policies that the passwords were created to enforce.