Workforce IAM – The Evolution which is a Revolution: The Impact of CIAM on WIAM

For many years, Identity & Access Management (IAM) systems in companies were focused on the internal organization, the employees and the access to internal company software systems and possibly other resources.

Read more
Support by cidaas

Digital identity verification – anywhere, anytime 

In an increasingly digitized world where online transactions and the transmission of sensitive data are obvious digital identity security is ...

Bots vs. captchas – Not as secure as everyone thinks? Bots solve captchas faster & better than humans.

One of the studies shows that bots are now faster and more accurate at resolving captchas than a person. Thus, ...

App Developer Portal: The best person to manage an Identity & Access Management System

An Identity & Access Management System, such as the one offered by cidaas, offers outstanding functions. But who is the ...

Part II: Identity & Access Management

After learning about the Digital Market Act (DMA) as a big picture in the previous blog, we'd like to look ...

Digital Markets Act – Digital Markets Act for Transparency & Fairness!

In a digitalised world, fairness and transparency in the markets should be maintained. In order to achieve this and create ...

Trustworthy access in an unsecure world  

In today's digital world, eCommerce has become an indispensable part of daily life. But while we rejoice in the benefits ...

Forgerock and Ping Identity – the merger that only matters to customers! 

Thoma Bravo announces the completion of its acquisition of Forgerock and integration with Ping Identity ...

Identity & Access Management as a Core Building Block of Cyber insurance: reporting and recertification

In our blog series Identity & Access Management (IAM) as a basic building block of cyber insurance, we take a ...

The Future of Living: The Connected Home and the Importance of Authentication and Authorization 

In an increasingly digitalized world, the concept of “Connected Home” is becoming more and more relevant. A connected home, also ...

Identity & Access Management as a Core Building Block of cyber insurance: Detecting cyber-attacks

In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...

Device authentication – it’s all about convenience! 

Username and password as authentication are no more! – We've been prophesying this for a while, but today we want ...

Identity & Access Management as a Core Building Block of Cyber Insurance: Authorization Management 

In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...