Today, I’m going to address less technical audience and explain the concept of breached passwords database and how to securely check if a password is…
View More Have I been pwned?Category: Identity
Risk and context of machine to machine flows
Risk Based Authentication is being promoted all around identity and is a great way to increase assurance levels with minimal friction. But what about machine…
View More Risk and context of machine to machine flowsBearEr and PoPs
Everyone who ever heard about OAuth2, possibly came across bearer tokens. Is it a special type of token? Not really. Bearer means one thing though.…
View More BearEr and PoPsLess is more. Forget all your passwords.
What is passwordless? Passwordless is a type of authentication, that utilises technical controls, other than passwords. As far as authentication is concerned, we have three…
View More Less is more. Forget all your passwords.Trust vs Authority in Access Recovery Procedures
I was trying really hard to focus on the technical aspect of identity, but today, you need to let me talk just a little bit.…
View More Trust vs Authority in Access Recovery ProceduresDigital Customer Experience – DCX. Identity Driven Digital Journeys.
We talk a lot about customer experience (CX) in the context of digital journeys, and many already realised that a good CX helps growing the…
View More Digital Customer Experience – DCX. Identity Driven Digital Journeys.Aaaarrrrgggghhhh! Pirate OAuth extensions – RAR, PAR and JAR explained.
Some time ago I wrote a blog about PAR (Pushed Authorization Request), today we are going to expand on that, by discussing all 3 extensions,…
View More Aaaarrrrgggghhhh! Pirate OAuth extensions – RAR, PAR and JAR explained.IAM Managed Service
What is an IAM Managed Service? Businesses are under pressure to increase agility which in turn increases IT complexity. IAM managed services help seamlessly manage…
View More IAM Managed ServiceDigitally Vulnerable Person (DVP)
For Ela and Ela, my mother in law and my mum’s sister. I recently had the pleasure of visiting a customer in Denmark and while…
View More Digitally Vulnerable Person (DVP)My-T-Factor. Deep dive into security of factors used in MFA.
Most if not all heard about MFA (Multi-Factor Authentication), but on at least a few occasions I came across heated debates around the actual strength…
View More My-T-Factor. Deep dive into security of factors used in MFA.