Blog
The Path of Unifying Identities
by Marius Goeddert
Most people in the identity and access management community would agree that digital identities are necessary for successful digitization. Tune in to today's Speaker Spotlight with One Identity's Field Strategist Robert Byrne to learn why it is necessary to unify identities in order to sensibly manage the access that is enabled by these digital identities, whether that is related to the lifecycle, privilege, authentication access management, or even directory security aspects of identity. Don't miss Robert's keynote at this year's European Identity and Cloud Conference 2023 entitled...
Blog
UK Data Protection – What Is Changing
by Mike Small
On March 8 th , 2023, the UK Government introduced a new Data Protection and Digital Information Bill (2) into parliament.  The government announcement of this bill claimed that “British Businesses to Save Billions Under New UK Version of GDPR”.   What does this mean in practical terms for businesses and consumers? Nothing has changed - yet This announcement needs to be put into context.  Firstly, the political context is that the government has been under pressure to show some tangible benefits from Brexit.  In September 2022, the UK...
Blog
Avoiding Pitfalls in CIAM
by Marius Goeddert
A frictionless customer experience can support an organization's security posture because it prevents users from engaging in risky behavior. Tune in to cidaas CEO Sadrick Widmann's Speaker Spotlight to learn why customer experience is not only useful for security but also for business.
Blog
Are Cyber Insurance Policies Necessary?
by Marina Iantorno
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance is used to cover a wide variety of costs associated with cyber incidents, including remediation costs, legal expenses, and losses as a result of reputational damage.    Cyber insurance coverage is often tailored to meet the requirements of the company insured. Insurance firms are carrying out increasingly thorough evaluations of the cybersecurity at organizations...
Blog
CIAM: Balancing security and user experience to get value from customer data
by Warwick Ashford
Business is increasing going online in the digital and post-pandemic era, and as a result, the collection, protection, and management of consumer and customer information has become extremely important. But keeping sensitive data like personally identifiable information private, safe, and secure, while at the same time ensuring it is accessible to the business and providing a frictionless user experience, can be challenging. Essential to meeting these important business challenges, is an understanding of the Customer Identity & Access Management (CIAM) technologies and processes...
Blog
Going Passwordless – Separating Identity and Authentication
by Alejandro Leal
Identity and Authentication Digital transformation can be defined as a process that organizations go through to deliver digital services to their customers and consumers in the Digital Age. Essentially, delivering digital services requires the management of the digital identities of consumers, customers, and business partners in a secure and seamless manner. Therefore, the success of digital transformation initiatives depends on managing access and managing these digital identities. In contrast to the increased centralization of digital identity, the authentication layer has become...
Blog
Gear Up for the Future with Decentralized Identity
by Warwick Ashford
In the digital era, business would greatly benefit from having increased identity assurance levels, be able to interact securely with partners, suppliers, consumers, and customers, and be able to reduce the administrative load during onboarding or ongoing verification of credentials. One potential solution, that is gaining momentum and support around the world, is the implementation of decentralized Identity systems that use verifiable credentials that are tamper proof, can be stored in a digital wallet, and can contain a decentralized identifier that is globally unique and can be...
Blog
Passwordless Authentication 101
by Martin Kuppinger
Passwordless authentication has become a trending topic in IT over the past two years. This comes to no surprise, with all the password-related security incidents that happened in the past years. Passwords are known as a security risks, and passwords are inconvenient to the users. Passwordless authentication bears the promise of increasing security and reducing friction. Done right, this is true. Passwordless authentication can overcome the notion of “balancing security with convenience”, which factually says that convenience goes down when the level of security increases, to a...
Blog
How to Find the Best IT Solution for Your Business
by Marina Iantorno
Every company has different needs. These will depend on company size, location, products they offer, not to mention the current infrastructure in place. Unfortunately, there is not a solution that “fits them all”, and the high maturity of the IT market leads to numerous vendors offering their services. In this context, the main issue is not to cover the needs of an organization, but to choose the best solutions and to understand their advantages and disadvantages. Process phases Evaluating and selecting vendors and solutions is not an easy task. It is a process and...
Blog
CSLS 2022 Is a Wrap
by Susanna Dück
Previous
2 3 4 5 6 7 8 Next