Governance of things – II

Governance of things - II IGA versus CMDB   (Identity Governance Administration v.s. Configuration Management Database)  In my previous blog, I discussed the topic of managing the digital identity of devices, [...]

Governance of things – II2022-07-29T00:24:01+02:00

Zero trust. That’s a utopia right?

Zero trust. That’s a utopia right? Chief Evangelist André Koot has been focusing on the field of Identity and Access management (IAM) for 20 years. In the beginning [...]

Zero trust. That’s a utopia right?2022-07-29T00:05:03+02:00

Diary day 3 of an EIC22 passenger

Diary day 3 of an EIC22 passenger This was a memorable day. Not in the least because of how Ingo Schubert (RSA SecureID) presented how gaming theory could help [...]

Diary day 3 of an EIC22 passenger2022-07-29T00:13:20+02:00

Diary day 2 of an EIC22 passenger

Diary day 2 of an EIC22 passenger The second day of KuppingerColes European Identity and Cloud Conference started with a number of presentation from EIC sponsors. Glad to report [...]

Diary day 2 of an EIC22 passenger2022-07-29T00:23:06+02:00

Diary of an EIC2022 passenger

Diary of an EIC2022 passenger - Day 1 Dear diary, Day 1 of KuppingerCole’s European Identity and Cloud Conference in Berlin Berlin, that’s a change. It may not be [...]

Diary of an EIC2022 passenger2022-07-29T00:16:28+02:00

What do you need for a successful IAM implementation?

What do you need for a successful IAM implementation? Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His [...]

What do you need for a successful IAM implementation?2022-07-29T00:18:55+02:00

The rediscovery of information security

The rediscovery of information security This blog has been due for quite some time. Ever since new privacy regulations have come into play, data breaches in (online) information systems [...]

The rediscovery of information security2022-07-29T00:26:21+02:00

Non-human workers need access rights too!

Non-human workers need access rights too! As an increasing number of devices, machinery and robots are integrated in the infrastructure of organizations, assigning rights to “non-human workers” is becoming [...]

Non-human workers need access rights too!2022-07-29T00:27:03+02:00
Go to Top