Zero trust. That’s a utopia right?
Zero Trust - a utopia right? Chief Evangelist André Koot has been focusing on the field of Identity and Access management (IAM) for 20 years. In the beginning [...]
Zero Trust - a utopia right? Chief Evangelist André Koot has been focusing on the field of Identity and Access management (IAM) for 20 years. In the beginning [...]
Involving the business in an IAM implementation And the potential pitfalls of not doing that adequately. Chief Evangelist André Koot has been focusing on the field of [...]
Diary day 3 of an EIC22 passenger Follow André Koot as he attends EIC2022 in this miniseries called ‘diary of an EIC22 passenger’. First-hand accounts, observations, reporting, and pictures. [...]
Diary day 2 of an EIC22 passenger Follow André Koot as he attends EIC2022 in this miniseries called ‘diary of an EIC22 passenger’. First-hand accounts, observations, reporting, and pictures. [...]
Diary of an EIC2022 passenger - Day 1 Follow André Koot as he attends EIC2022 in this miniseries called 'diary of an EIC22 passenger'. First-hand accounts, observations, reporting, and [...]
Common mistakes when implementing IAM software Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His message is clear. [...]
Ingredients for successful IAM implementation Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His message is clear. IAM [...]
Governance of things - II IGA versus CMDB (Identity Governance Administration v.s. Configuration Management Database) In my previous blog, I discussed the topic of managing the digital identity of devices, [...]
Governance of things More and more non-human accounts are appearing in organizations. Accounts that belong to things, robots, RPAs (Robotic Process Automation components), devices, sensors and what not. Accounts that need access to systems, processes, [...]
The rediscovery of information security This blog has been due for quite some time. Since new privacy regulations have come into play, data breaches in (online) information systems have [...]