Before leaving on an extended (and expensive) vacation, I bought travel insurance. I wanted to protect myself in case I or my traveling partner tested positive for COVID-19. I had…
Browsing CategoryIdentity Management
Solving 5 Challenges of Contact Tracing Apps
Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective…
Moving Threat Identification From Reactive to Predictive and Preventative
In a previous post, we focused on organizations’ characteristics, such as sector, geography, risk and impact, when discussing the pillars of building a threat identification program. Now, we move deeper…
Consider the Human Angle in Your Threat Modeling
When it comes to threat modeling, many businesses plan as if there were only a few possible scenarios in which cybersecurity or privacy-related incidents could occur. We need to plan…
When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics
Knowing who your users are today is more important than ever. This explains, in part, why integrating biometric usage into identity and access management (IAM) appears appealing. Throw in some…
How CIAM Addresses the Challenges of Consumer Identity Management
Consumer identities are at the heart of brand engagements today. Digital interactions are a routine part of our lives and touchpoints for consumers have reached astounding heights. Nearly 60 percent…
Workforce Versus Consumer IAM: Key Differences and Use Cases
As a consumer, have you ever visited an online retail site only to be bombarded by a pop-up window asking for your email address in order to get a nominal…
Can Authentication Negatively Impact the User Experience?
Authentication can sometimes feel like a balancing act. On one hand, securing your digital experience is a top priority. Preserving your customers’ trust in your services is often key to…
iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps
Apple users of the world, 13 is your lucky number: iOS 13 has arrived! As expected, this new iteration of Apple’s mobile operating system comes with a slew of changes,…
How to Select the Right IDaaS Vendor and Avoid Deployment Pain Points
Since the advent of the cloud, the number of -as-a-service solution offerings has exploded. But most businesses continue to operate with a mix of on-premises and cloud applications that need…