Begin Here to Build a Trusted Business

According to the PwC 21st Annual Global Survey, reliability, congruence, consistency, and transparency are the four pillars for building trust…

6 years ago

Customer IAM for GDPR Compliance

In order to protect the digital privacy of European citizens, the European Union created the General Data Protection Regulation to…

6 years ago

Security or Functionality? Security Risks with Digital Transformation

Digital transformation has been adopted by most companies from around the world, resulting in a more connected and innovative business…

6 years ago

How Technology Can Simplify IT Security

Just last year, the popular Q&A site Quora suffered a data breach, as reported by Techworld in their article on…

6 years ago

Can an IAM solution prevent Credential Phishing?

The most common misconception regarding credential phishing is that it is people-driven and not organization-driven. Therefore, organizations tend to underestimate…

6 years ago

Enforce Device-based Restrictions with Akku

One of the biggest benefits of cloud computing is the level of accessibility it enables - from anywhere, and at…

6 years ago

Myths about Multi-factor Authentication

When large organizations like LinkedIn, Twitter and Facebook report password hacks, it throws some light on how vulnerable current systems…

6 years ago

Identity and Access Management for Social Engineering Attacks

When in action, a social engineering attack could look like an email received from a government organization or your own…

6 years ago

Overcoming the Challenges of the Media Industry With Identity

When the digital revolution started, media companies were among the first ones to embrace it. Today, most media companies create…

6 years ago

Security vs. Usability

Security vs. usability - the debate has been around for quite a while now. Which one would you prioritize? Would…

6 years ago