Tag "Identity Management"

Back to homepage
Hardware/Network

Cyber security for IoT and edge computing

The internet of things has its own unique cybersecurity considerations, as for cyber security and Edge computing, there are a lot of unknowns. It’s almost an afterthought. According to Ben

Cloud

Five ways to manage authorization in the cloud

The public cloud is being rapidly incorporated by organizations, allowing them to store larger amounts of data and applications with higher uptime and reduced costs, while at the same time, introducing new

Identity Theft

Why identity is the foundation of security

Once upon a time, companies secured their valuable information by locking file cabinets and installing passwords and firewalls around databases and systems in office-based computers. Maybe they also had video

Hardware/Network

The trouble with enterprise IoT and its identity management problem

The Internet of Things (IoT) encompasses a growing number of connected devices ranging from security cameras to smart thermostats. Many businesses use enterprise-level IoT devices to help workers get things

Identity Theft

Having an identity crisis? How to manage access for every level of user, from your CEO to your customers

What’s changed, and how can organisations achieve the right balance in user experience and security in today’s changing IT landscape? If we want to get something done, there is usually

Software

Building shared digital identity using blockchain technology

I previously described challenges both consumers and organizations face when it comes to user identity and how a shared digital identity can reshape digital trust as we know it.In an

Cloud

Safeguarding hybrid-cloud infrastructures through identity privilege management

Most enterprises have embraced the advantages a cloud infrastructure can bring to their computing, storage, network or other needs, and many are juggling multiple cloud platforms, some private and other

Software

You are who you say you are: Establishing digital trust with the blockchain

Over the last few years, blockchain use has gained popularity driven partly by the interest in cryptocurrency, but mostly with the growing understanding of what distributed ledger technology can enable through decentralization

Identity Theft

What is IAM? Identity and access management explained

Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted

Software

Why identity verification needs to be a part of your digital transformation strategy

Smartphones and tablets are an indispensable part of daily life, and consumers expect nothing less than a streamlined mobile experience. With this in mind, businesses are focusing on digital transformation efforts in