Zero trust. That’s a utopia right?

Zero Trust - a utopia right? Chief Evangelist André Koot has been focusing on the field of Identity and Access management (IAM) for 20 years. In the beginning [...]

Zero trust. That’s a utopia right?2023-08-28T16:29:12+02:00

Involving the business in an IAM implementation

Involving the business in an IAM implementation And the potential pitfalls of not doing that adequately. Chief Evangelist André Koot has been focusing on the field of [...]

Involving the business in an IAM implementation2023-08-28T16:21:05+02:00

Diary day 3 of an EIC22 passenger

Diary day 3 of an EIC22 passenger Follow André Koot as he attends EIC2022 in this miniseries called ‘diary of an EIC22 passenger’. First-hand accounts, observations, reporting, and pictures. [...]

Diary day 3 of an EIC22 passenger2023-11-02T11:39:54+01:00

Diary day 2 of an EIC22 passenger – Day 2

Diary day 2 of an EIC22 passenger Follow André Koot as he attends EIC2022 in this miniseries called ‘diary of an EIC22 passenger’. First-hand accounts, observations, reporting, and pictures. [...]

Diary day 2 of an EIC22 passenger – Day 22023-11-02T11:39:03+01:00

Diary of an EIC22 passenger – Day 1

Diary of an EIC2022 passenger - Day 1 Follow André Koot as he attends EIC2022 in this miniseries called 'diary of an EIC22 passenger'. First-hand accounts, observations, reporting, and [...]

Diary of an EIC22 passenger – Day 12023-11-02T11:37:44+01:00

Common mistakes when implementing IAM software

Common mistakes when implementing IAM software Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His message is clear. [...]

Common mistakes when implementing IAM software2023-08-28T15:51:45+02:00

Ingredients for successful IAM implementation

Ingredients for successful IAM implementation Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His message is clear. IAM [...]

Ingredients for successful IAM implementation2023-11-02T12:05:28+01:00

Governance of things – II

Governance of things - II IGA versus CMDB   (Identity Governance Administration v.s. Configuration Management Database)  In my previous blog, I discussed the topic of managing the digital identity of devices, [...]

Governance of things – II2023-08-28T17:21:00+02:00

Governance of things

Governance of things More and more non-human accounts are appearing in organizations. Accounts that belong to things, robots, RPAs (Robotic Process Automation components), devices, sensors and what not. Accounts that need access to systems, processes, [...]

Governance of things2023-08-29T17:09:15+02:00

The rediscovery of information security

The rediscovery of information security This blog has been due for quite some time. Since new privacy regulations have come into play, data breaches in (online) information systems have [...]

The rediscovery of information security2023-08-28T17:00:51+02:00
Go to Top