Category: IAM

Identity and Access Management for Social Engineering Attacks

When in action, a social engineering attack could look like an email received from a government organization or your own…

6 years ago

Overcoming the Challenges of the Media Industry With Identity

When the digital revolution started, media companies were among the first ones to embrace it. Today, most media companies create…

6 years ago

Security vs. Usability

Security vs. usability - the debate has been around for quite a while now. Which one would you prioritize? Would…

6 years ago

Customer Identity and Access Management – How is it different from IAM?

For organizations, it is crucial to ensure data security and, therefore, IAM has become a crucial part of every network…

6 years ago

Healthcare Data, HIPAA Compliance, and Akku

The Health Insurance Portability and Accountability Act (HIPAA) has been effective in the USA since 1996.  The Act actually has…

6 years ago

A How-to Guide to Privileged Identity Management

Privileged Identity Management (PIM) refers to the control and monitoring of access and activity involving privileged user identities within an…

6 years ago

What is advanced server access?

Advanced Server Access is a relatively new aspect of identity and access management system for the cloud. In fact, it…

6 years ago

The Importance of Single Sign-on for Educational Institutions

Let’s admit it: schools and universities today are not what they used to be back when we were growing up.…

6 years ago

Hashing And Salting – The What And How

“irgvctxmsr” - sounds like gibberish, doesn’t it? But if you were to decrypt this string using a mono-alphabet shift cipher…

6 years ago

3 Important steps to improve network security against brute-force attacks

A brute-force attack is a type of cybercrime which involves automated hacking activity using bots. The primary aim of a…

6 years ago