Working holoctaric and IAM, that doesn’t work together, does it?
Working holoctaric and IAM, that doesn't work together, does it? Chief Evangelist André Koot has been focusing on the field of Identity and Access management (IAM) for 20 years. [...]
Working holoctaric and IAM, that doesn't work together, does it? Chief Evangelist André Koot has been focusing on the field of Identity and Access management (IAM) for 20 years. [...]
NIS2 needs IAM, even though it is not mentioned Introduction The Network and Information Systems (NIS) 2 Directive is the new EU cybersecurity directive that aims to increase the [...]
SSI, will it work? Report out - Seminar on SSI – Security Leadership Brussels On October 5th 2022 there was workshop at the Security Leadership event in Brussels [...]
What is 'Identity Day'? The 16th of September is Identity Day again. You may have heard of it, or not, but what exactly is this Identity day, and why [...]
Governance of things - II IGA versus CMDB (Identity Governance Administration v.s. Configuration Management Database) In my previous blog, I discussed the topic of managing the digital identity of devices, [...]
Zero trust. That’s a utopia right? Chief Evangelist André Koot has been focusing on the field of Identity and Access management (IAM) for 20 years. In the beginning [...]
Diary day 3 of an EIC22 passenger This was a memorable day. Not in the least because of how Ingo Schubert (RSA SecureID) presented how gaming theory could help [...]
Diary day 2 of an EIC22 passenger The second day of KuppingerColes European Identity and Cloud Conference started with a number of presentation from EIC sponsors. Glad to report [...]
Diary of an EIC2022 passenger - Day 1 Dear diary, Day 1 of KuppingerCole’s European Identity and Cloud Conference in Berlin Berlin, that’s a change. It may not be [...]
What are the most common mistakes made when implementing IAM software? Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 [...]