Fully Homomorphic Encryption at a Glance
With today's technology, we can effectively encrypt data in rest and data in motion. What about data in use? There the Fully Homomorphic Encryption (FHE) comes into play. This guide shows you how FHE can be the actual "Holy Grail" of encryption. Read now!
Women in Identity
We all know that women are facing the challenge of diversity in the IT industry. But what exactly is a digital twin? And how can we build a Self-sovereign Identity? Woman in Identity (WID) has prepared three exciting sessions for you. Find out more in their blog post below.
Curse and Blessing of Biometric Authentication
Technology in itself is neither moral nor immoral, is it? It depends on how it is used. We need to have a discussion about how we move forward. Watch the interview with Mike to learn more about his views on this topic.
Digitization to Dissolve Data Privacy
The rapid digitization of businesses and utilization of cloud capabilities has led to a situation where data privacy is nearly none existent. So how will we deal with this challenge? To learn more, watch the interview.
Securing Hybrid IT and Multi Cloud Environments
Organizations Need a Dream IAM
Did your organization define a ‘desired state’ for identity and access management? You need a clear goal because you need to know where you're headed to align your resources, people, and technology toward a mission. Watch now to learn more.
CrashOverRide or the Need for Putting OT Security at the Center of Attention
PCI-DSS 4.0 launched
The Payment Card Industry (PCI) Standards Council has published a major update to the Data Security Standard (DSS), version 4.0. This version is an improvement over the current version, 3.2.1, which came out in 2018.
Catalyzing your Digital Transformation Journey
Digital Transformation is here, and it impacts everyone, businesses, and governments. It is changing society as a whole and the way we engage with each other in virtually every area of life. The question of if and when to develop a digital transformation strategy is not even an issue. Start now
Passwordless Authentication: Never Easier or More Desirable Than Now
What is stopping you from implementing passwordless authentication in your company? Passwords are insecure, everyone knows that but what is the first step to secure access? Find out now!
Decentralizing Identity for the Digital Era
Web 3.0 Creates a World Without Perimeters
The visions of Web3 will be mainstream one day but how we implement security and trust, is still up for debate. We are on the threshold of further evolution and must set the right course. But how? Learn more.
Previous
10 11 12 13 14 15 16 Next