NIS2 needs IAM, even though it is not mentioned

NIS2 needs IAM, even though it is not mentioned Introduction The Network and Information Systems (NIS) 2 Directive is the new EU cybersecurity directive that aims to increase the [...]

NIS2 needs IAM, even though it is not mentioned2023-01-15T13:35:36+01:00

What is ‘Identity Day’?

What is 'Identity Day'? The 16th of September is Identity Day again. You may have heard of it, or not, but what exactly is this Identity day, and why [...]

What is ‘Identity Day’?2022-09-15T09:50:38+02:00

Governance of things – II

Governance of things - II IGA versus CMDB   (Identity Governance Administration v.s. Configuration Management Database)  In my previous blog, I discussed the topic of managing the digital identity of devices, [...]

Governance of things – II2022-07-29T00:24:01+02:00

Zero trust. That’s a utopia right?

Zero trust. That’s a utopia right? Chief Evangelist André Koot has been focusing on the field of Identity and Access management (IAM) for 20 years. In the beginning [...]

Zero trust. That’s a utopia right?2022-07-29T00:05:03+02:00

Diary day 3 of an EIC22 passenger

Diary day 3 of an EIC22 passenger This was a memorable day. Not in the least because of how Ingo Schubert (RSA SecureID) presented how gaming theory could help [...]

Diary day 3 of an EIC22 passenger2022-07-29T00:13:20+02:00

Diary day 2 of an EIC22 passenger

Diary day 2 of an EIC22 passenger The second day of KuppingerColes European Identity and Cloud Conference started with a number of presentation from EIC sponsors. Glad to report [...]

Diary day 2 of an EIC22 passenger2022-07-29T00:23:06+02:00

Diary of an EIC2022 passenger

Diary of an EIC2022 passenger - Day 1 Dear diary, Day 1 of KuppingerCole’s European Identity and Cloud Conference in Berlin Berlin, that’s a change. It may not be [...]

Diary of an EIC2022 passenger2022-07-29T00:16:28+02:00
Go to Top