Workforce IAM – The Evolution which is a Revolution: The Impact of CIAM on WIAM

For many years, Identity & Access Management (IAM) systems in companies were focused on the internal organization, the employees and the access to internal company software systems and possibly other resources.

Read more
Support by cidaas

Trustworthy access in an unsecure world  

In today's digital world, eCommerce has become an indispensable part of daily life. But while we rejoice in the benefits ...

Forgerock and Ping Identity – the merger that only matters to customers! 

Thoma Bravo announces the completion of its acquisition of Forgerock and integration with Ping Identity ...

Identity & Access Management as a Core Building Block of Cyber insurance: reporting and recertification

In our blog series Identity & Access Management (IAM) as a basic building block of cyber insurance, we take a ...

The Future of Living: The Connected Home and the Importance of Authentication and Authorization 

In an increasingly digitalized world, the concept of “Connected Home” is becoming more and more relevant. A connected home, also ...

Identity & Access Management as a Core Building Block of cyber insurance: Detecting cyber-attacks

In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...

Device authentication – it’s all about convenience! 

Username and password as authentication are no more! – We've been prophesying this for a while, but today we want ...

Identity & Access Management as a Core Building Block of Cyber Insurance: Authorization Management 

In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...

An AutoIdent in the SCHUFA MyConnect hub – The role of the cidaas ID validator! 

The SCHUFA, whoever hears this name, immediately thinks of credit assessment, creditworthiness and not without reason. Schufa is the largest ...

Identity & Access Management as a Core Building Block of cyber insurance: multi-factor authentication 

In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...

The Professional secrecy holders and Identity & Access Management 

In this blog, we will take a closer look at a special professional group - the professional secrecy holders - ...

Authentication vs. Authorization – how both concepts work hand in hand 

The concepts of authentication and authorization, and in particular the difference between the two, still cause some difficulties in understanding ...

Top 3 Software Trends in 2023 – so far! 

Halfway through 2023, it's time to take a look at the top 3 software trends so far. New and cool ...