Navigator
Enabling Digital Engagement With GAIN
by Warwick Ashford
Digital engagement is a key driver of economic growth, but the lack of reusable, verified identities is a significant problem that needs to be solved. At present, there is no way for anyone to get a single, verified identity that can be used to interact with government services, employers, health providers, and other service providers around the world. The digital economy is being held back by the lack of any means to provide trust in identity transactions, to ensure that individuals are who they claim to be, and to verify that the origin and destination of identity attributes are...
Blog
Do Machines Have Consciousness and Feelings?
by Marina Iantorno
Human imagination is like a box with a wide range of ideas: every person could imagine different things, but as a society it is common to picture outstanding scenarios where the species would achieve amazing progress. For instance, some movies like X-Machina or Bicentennial Man envisioned a future where relationships between robots and people are possible, and implanted the idea of machines having consciousness and feelings towards others. We probably looked at these films as impossible scenarios, but what happens when reality overlaps with fiction? A few days ago, many people around...
Navigator
Secure Collaboration
by Warwick Ashford
The world of working is changing – we are increasingly working collaboratively in teams, but members of those teams are no longer necessarily in the same office, location, or even the same organization. But all forms of collaborative work require team members to share data, and in the face of rampant data theft, secure collaboration is essential. To remain competitive, organizations need to ensure that employees are able to communicate and exchange data easily and securely with authorized internal and external collaborators, wherever they may be in the world. Increasingly,...
Navigator
Security Automation
by Warwick Ashford
As the intensity and sophistication of cyber-attacks, and the complexity of business IT environments continue to increase amid an ongoing worldwide shortage of skilled cybersecurity professionals and a growing number of data protection regulations, many organizations are looking to security automation as a potential solution. As machine learning and other forms of artificial intelligence have matured, security automation has become increasingly practical, but at the same time it has become increasingly necessary to stem the tide of cyber-attacks that thanks to the same AI technologies...
Blog
Trending at EIC 2022: Identity Proofing & Fraud Reduction
by Martin Kuppinger
Aside from the convergence of decentralized and centralized identities and the return of policy-based access controls, here is my #3 on the list of hot topics at EIC 2022: Identity proofing & fraud reduction. These are two closely related topics, with fraud covering not only the initial proof of an identity, but also the recurring access and user behavior. Massive market uptake We have seen a massive uptake in both fields, with identity proofing also having a close link to decentralized identities and the reusable proofs in identity wallets. Identity proofing as the reliable...
Blog
Trending at EIC 2022: The Return of Policy-Based IAM
by Martin Kuppinger
Following my recent blog post on trending topics at EIC 2022, where I discussed the integration of decentralized and centralized identities, there are other topics I’d like to highlight. My #2 on the list of outstanding topics at EIC 2022, is the return of policy-based IAM. More than a decade ago, XACML (eXtensible Access Control Markup Language) was a trending topic, as a standard that allows applications to send a request to an authorization server at run-time. The server then checked this request and either granted or revoked access (or granted access with restrictions)....
Navigator
Security Fabrics
by Warwick Ashford
Cybersecurity has never been more important or challenging. A worldwide shortage of people with the necessary cybersecurity skills is coinciding with increasing complexity of business IT environments and the further industrialization of the cybercrime industry alongside an increase in state-sponsored cyber threats. Cyber-attacks have continued to intensify and diversify as the attack surface has expanded with organizations increasingly adopting cloud-based services, mobile and home working, and internet-connected devices (IoT and IIoT) as part of accelerated digital transformation...
Blog
Trending at EIC 2022: Integrating Decentralized & Centralized Identity
by Martin Kuppinger
At this year’s European Identity & Cloud Conference (EIC 2022) that we hosted in Berlin from May 10 th to 13 th , some topics stood out from all the vibrant discussions and enlightening presentations. My #1 topic is the emergence of integration between decentralized identity (DID) - also referred to Self-Sovereign Identity (SSI) or as verifiable credentials - and traditional, centralized IAM (Identity & Access Management) and CIAM (Consumer IAM). DID has been a hot topic at EIC for many years, but more as an innovation that is somewhat separate from traditional IAM....
Blog
Enter Microsoft Entra
by Anne Bailey
Today, Microsoft announced a new name for their identity product family which encompasses familiar capabilities alongside new capability launches. Microsoft Entra covers identity, including Azure Active Directory (Azure AD), Permissions Management, and Verified ID. Azure AD is a familiar offering and will remain available stand-alone. But it is now accompanied by a Cloud Infrastructure Entitlement Management (CIEM) offering and a decentralized identity offering. At first glance, Microsoft Entra Permissions Management has a smattering of interesting functionality like visibility on...
Blog
The Changing Market for Access Control & Risk Management for Business Applications
by Martin Kuppinger
Pathlock’s acquisition tour is changing the market dynamics A few days ago, Pathlock, one of the leading providers in the market for Access Control & Risk Management for Business Applications , has announced a merger with Appsian and Security Weaver, and the acquisition of CSI Tools and SAST Solutions. With that, five of the vendors in this market segment, become one. In our recent Leadership Compass on Access Control Solutions for SAP and other LoB (Line of Business) Applications , we had covered overall 23 vendors. With five of these merging into one, it becomes apparent...
Previous
4 5 6 7 8 9 10 Next