Flying Cars & A World Without Passwords
As a kid growing up in the ‘80s, I remember in elementary school a discussion predicting we would have flying cars by the time I was a grown-up. Almost four decades later, no flying cars,…
As a kid growing up in the ‘80s, I remember in elementary school a discussion predicting we would have flying cars by the time I was a grown-up. Almost four decades later, no flying cars,…
In recent months, the workplace landscape has witnessed a drastic change. With an increasing amount of remote workers, data breaches are on the rise and system safeguards are now more essential than ever. Reports state…
Choosing new software is never easy. Coming up with selection criteria means that you need to understand your company’s needs and strengths. What questions should you ask to determine which identity governance tool is right…
If your company was fined $123 million for doing something wrong, you’d probably do everything you could to avoid it happening again, wouldn’t you? UK authorities fined Marriott $123 million for the 2018 Starwood breach…
“Sign-on” and “login” have grown by leaps and bounds since the phrases first came into use. They used to just refer to validating a username and a password before allowing a user to access protected/secured…
We’ve previously addressed how OAuth is a critical component of API Security for modern applications because it provides a means for end users (a.k.a. resource owners) to authorize application access to personal resources. Even though…
As more businesses enrich their user experiences for mobile devices and client-side browser technologies, they are forced to create publicly accessible APIs. So often, those APIs read and modify sensitive customer data, making them just…
It is obvious that there are many benefits of cloud computing. Don’t worry, I am not going to document them here because that has already been done many times. By now, you already realize what…
What do you think of when you hear “access management”? Most people think of SSO (single sign-on) and stop there. While SSO is part of access management, it's just a small part. Access management is…
Are you an IT professional responsible for access management for your entire organization? Do you know you need an identity governance solution within your organization, but are having a hard time justifying it to upper…