The picture (not sure of the source) made me chuckle, but it’s an interesting topic, fairly close to my heart (having worked as a network…
View More Network security – a relic in a Zero Trust world or… not quite yet?Author: Marcin Zimny
Does PAM have to be scary and make our lives difficult?
A few months ago I came across funny memes about identity on LinkedIn, some of which went viral. Gave my thumbs up, as you would…
View More Does PAM have to be scary and make our lives difficult?Identity proofing and its functions – security and business. The good, the bad, the fraud…
Most of those who worked with me know, that I love to draw lines between identity terms and I am somewhat of a semantics freak.…
View More Identity proofing and its functions – security and business. The good, the bad, the fraud…OAuth2 PAR – Pushed Authorisation Requests
Traditionally in the OAuth’s Authorisation Code Grant flow user starts the journey through the front channel, requesting a resource from the authorisation server via a…
View More OAuth2 PAR – Pushed Authorisation RequestsMulti-Factor Authentication (MFA) Explained
Multi-factor authentication (MFA) – most of us have heard the term. Let’s take a closer look at what authentication is and why modern platforms utilise…
View More Multi-Factor Authentication (MFA) ExplainedReduce cyber insurance renewal cost and increase your security posture.
Cyber insurance has become a very popular risk mitigation control against all sorts of cyber incidents that may affect businesses. In risk management, it’s a…
View More Reduce cyber insurance renewal cost and increase your security posture.In anticipation for passwordless, what’s the next best thing?
Passwordless authentication is the future, no doubt about it. It increases security, retires the concept of phishing and provides excellent customer experience. No more remembering…
View More In anticipation for passwordless, what’s the next best thing?