Workforce IAM – The Evolution which is a Revolution: The Impact of CIAM on WIAM
For many years, Identity & Access Management (IAM) systems in companies were focused on the internal organization, the employees and the access to internal company software systems and possibly other resources.
Read moreTrustworthy access in an unsecure world
In today's digital world, eCommerce has become an indispensable part of daily life. But while we rejoice in the benefits ...
Forgerock and Ping Identity – the merger that only matters to customers!
Thoma Bravo announces the completion of its acquisition of Forgerock and integration with Ping Identity ...
Identity & Access Management as a Core Building Block of Cyber insurance: reporting and recertification
In our blog series Identity & Access Management (IAM) as a basic building block of cyber insurance, we take a ...
The Future of Living: The Connected Home and the Importance of Authentication and Authorization
In an increasingly digitalized world, the concept of “Connected Home” is becoming more and more relevant. A connected home, also ...
Identity & Access Management as a Core Building Block of cyber insurance: Detecting cyber-attacks
In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...
Device authentication – it’s all about convenience!
Username and password as authentication are no more! – We've been prophesying this for a while, but today we want ...
Identity & Access Management as a Core Building Block of Cyber Insurance: Authorization Management
In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...
An AutoIdent in the SCHUFA MyConnect hub – The role of the cidaas ID validator!
The SCHUFA, whoever hears this name, immediately thinks of credit assessment, creditworthiness and not without reason. Schufa is the largest ...
Identity & Access Management as a Core Building Block of cyber insurance: multi-factor authentication
In our blog series Identity & Access Management (IAM) as a core building block of cyber insurance, we take a ...
The Professional secrecy holders and Identity & Access Management
In this blog, we will take a closer look at a special professional group - the professional secrecy holders - ...
Authentication vs. Authorization – how both concepts work hand in hand
The concepts of authentication and authorization, and in particular the difference between the two, still cause some difficulties in understanding ...
Top 3 Software Trends in 2023 – so far!
Halfway through 2023, it's time to take a look at the top 3 software trends so far. New and cool ...