Author: Akku

The risks of depending on password-based login

Logging in to a system without a password may seem unsafe. After all, a long, complex password has long been…

3 years ago

Identity and Access Management Challenges in the Education Industry

The education industry faces unique identity and access management challenges; different education systems have specific IAM needs that depend on…

5 years ago

Can IAM Improve User Experience and Efficiency on the Cloud?

When an enterprise migrates to the cloud, it essentially opens the doors to a range of new possibilities for its…

5 years ago

Cybersecurity Trends 2020: What’s in Store

The year 2019 has been a significant one in the technology world, with several high profile cases grabbing headlines. In…

5 years ago

Understanding Offensive Security

Approximately two billion records were stolen between July and October 2019. That’s just in one quarter of a year! This…

5 years ago

Access Management Across Different Devices and Browsers

In today’s technology ecosystem, a strong foundation for authorization plays an important role in the overall data security of a…

5 years ago

Exploring the Difference Between Identity Management and Access Management

Only a small percentage of people across industries understand the difference between Identity Management and Access Management. The two concepts…

5 years ago

Managing Identity and Access in the Workplace

Identity and access management, sometimes simply known as identity management, refers to the IT function of maintaining security through the…

5 years ago

Begin Here to Build a Trusted Business

According to the PwC 21st Annual Global Survey, reliability, congruence, consistency, and transparency are the four pillars for building trust…

5 years ago

Identity and Access Management for Social Engineering Attacks

When in action, a social engineering attack could look like an email received from a government organization or your own…

6 years ago