Workforce IAM – The Evolution which is a Revolution: The Impact of CIAM on WIAM
For many years, Identity & Access Management (IAM) systems in companies were focused on the internal organization, the employees and the access to internal company software systems and possibly other resources.
Read more
Two-factor authentication: when does it become a requirement?
Currently, the use of authentication methods is voluntary in many cases, which often leads to the additional security mechanisms being ...
NIS2 – the future of cybersecurity in the EU: what companies need to know now
The European Union has adopted a new directive - NIS2. But what exactly does NIS2 regulate and who is affected? ...
The shift from on-premise to cloud-based IAM solutions: Trends in Identity & Access Management (IAM)Â
In today's digital world, Identity & Access Management (IAM) is crucial to ensure the security and smooth running of business ...
Workforce IAM – The Evolution which is a Revolution: The (R)evolution of Workforce IAMÂ
Implementing (Workforce) Identity & Access Management (IAM) is no longer just an option for enterprises today, but an absolute necessity ...
Workforce IAM – The Evolution which is a Revolution: The Impact of CIAM on WIAMÂ Â
Find out more about Workforce IAM in our new blog series. In the first part, you will find out what ...
The revDPA in Switzerland: A new era of data protection & how Customer Identity & Access Management can support.Â
The digital landscape is constantly changing, and with it the legal regulations that affect businesses and user data. One such ...
Digital Markets Act for SME’s – how do I make the most of my opportunities with Customer Identity & Access Management?
In this blog post, we will explore the importance of the Digital Markets Act (DMA) in relation to small and ...
eIDAS 2.0 – taking the future of digital identity in Europe to the next levelÂ
In an increasingly digitized world, digital identity is steadily gaining in importance. It enables us to act securely and conveniently ...
Digital identity verification – anywhere, anytime 
In an increasingly digitized world where online transactions and the transmission of sensitive data are obvious digital identity security is ...
Bots vs. captchas – Not as secure as everyone thinks? Bots solve captchas faster & better than humans.
One of the studies shows that bots are now faster and more accurate at resolving captchas than a person. Thus, ...
App Developer Portal: The best person to manage an Identity & Access Management System
An Identity & Access Management System, such as the one offered by cidaas, offers outstanding functions. But who is the ...
Part II: Identity & Access Management
After learning about the Digital Market Act (DMA) as a big picture in the previous blog, we'd like to look ...