Access and Identity

Blog

Seven Fundamentals for Future Identity and Access Management

Identity and Access Management is changing rapidly. While the traditional focus has been on employees and their access to internal systems, with an emphasis on the HR system as the leading source for identity information, Identity Management has to address a far more complex environment…

Blog

FIDO Alliance announces final FIDO 1.0 specifications

Yesterday, culminating over 20 months of hard work, FIDO Alliance has published final 1.0 drafts of their Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F) specifications, apparently setting a world record in the process as the world’s fastest development of a…

Webcast

Access Governance for Today's Agile, Connected Businesses

KuppingerCole Webinar recording

Executive View

Executive View: Courion Access Governance/Risk Products - 71046

The GRC triumvirate (Governance, Risk and Compliance) have long been mainstays of Identity Management (IdM). In fact, IdM has mutated into Identity and Access Management (IAM) as well as Identity and Access Governance (IAG).  Access Governance remains one of the fastest growing market…

Executive View

Executive View: CyberArk Privileged Threat Analytics - 70859

In gewisser Hinsicht war Privilege Management (PxM) schon in den ersten Mainframe-Umgebungen vorhanden: Diese frühen Mehrbenutzersysteme boten bereits gewisse Möglichkeiten, Administrator-Accounts sowie gemeinsam genutzte Accounts zu prüfen und zu überwachen. Trotzdem…

Leadership Compass

Leadership Compass: IAM/IAG Suites - 71105

Leaders in innovation, product features, and market reach for IAM/IAG Suites. Integrated, comprehensive solutions for Identity and Access Management and Governance, covering all of the major aspects of this discipline such as Identity Provisioning, Federation, and Privilege Management.…

Blog

Big News from the FIDO Alliance

FIDO Alliance (where FIDO stands for Fast IDentity Online) is an industry consortium formed in July 2012 with a goal to address the lack of interoperability among various strong authentication devices. Currently among its members are various strong authentication solution vendors (such as…

Webcast

IAM for the User: Achieving Quick-wins in IAM Projects

KuppingerCole Webinar recording

Blog

Mobile, Cloud, and Active Directory

Cloud IAM is moving forward. Even though there is no common understanding of which features are required, we see more and more vendors – both start-ups and vendors from the traditional field of IAM (Identity and Access Management) – entering that market. Aside from providing an alternative…

Webinar

Dec 09, 2014: Access Governance for today’s agile, connected businesses

In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the…

Blog

SAP enters the Cloud IAM market – the competition becomes even tougher

The market for Cloud IAM and in particular Cloud User and Access Management – extending the reach of IAM to business partners, consumers, and Cloud applications through a Cloud service – is growing, both with respect to market size and service providers. While there were a number of…

Advisory Note

Advisory Note: Maturity Level Matrixes for Identity and Access Management/Governance - 70738

KuppingerCole Maturity Level Matrixes for the major market segments within IAM (Identity and Access Management) and IAG (Identity and Access Governance). Foundation for rating the current state of your IAM/IAG projects and programs.

Leadership Compass

Leadership Compass: Access Governance - 70948

Leaders in innovation, product features, and market reach for Identity and Access Governance and Access Intelligence. Your compass for finding the right path in the market.

Executive View

Executive View: Okta Cloud IAM Platform - 70887

Both Cloud computing and Identity and Access Management (IAM) can trace their beginnings to the late 1990’s. Cloud computing began as “web services” then developed into Software as a Service (SaaS) later expanding to cover areas such as Platform as a Service (PaaS)…

Webinar

Oct 16, 2014: IAM for the user: Achieving quick-wins in IAM projects

Many IAM projects struggle or even fail because demonstrating their benefit takes too long. Quick-wins that are visible to the end users are a key success factor for any IAM program. However, just showing quick-wins is not sufficient, unless there is a stable foundation for IAM delivered as…

Webinar

Sep 24, 2014: Intelligent Identity Management in the Cloud – a use case

Most organisations fail to plan identity management in the Cloud. They adopt a variety of software-as-a-service solutions each requiring its own identity repository with a periodic synchronisation that fails to provide sufficient governance over de-provisioned accounts. This webinar looks at…

Executive View

Executive View: Oracle Enterprise Single Sign-On Suite Plus - 71024

Bei Enterprise Single Sign-On (E-SSO) handelt es sich um eine etablierte Technologie, die trotz der Fortschritte im Bereich Identity Federation auch heute noch eine wichtige Rolle spielt. Dies gilt auch im Hinblick auf die wachsende Zahl von Cloud-SSO-Lösungen, die als lokale, als…

Executive View

Executive View: CA ControlMinder - 71059

CA Technologies is a multinational publicly held software company headquartered in New York, USA. Founded in 1976 to develop and sell mainframe software, over the decades CA Technologies has grown significantly via a series of strategic acquisitions. Although it used to produce consumer…

Executive View

Executive View: CyberArk Privileged Threat Analytics - 70859

In some form, Privilege Management (PxM) already existed in early mainframe environments: those early multi-user systems included some means to audit and control administrative and shared accounts. Still, until relatively recently, those technologies were mostly unknown outside of IT…

Executive View

Executive View: WSO2 Identity Server - 71129

In contrast to common application servers, WSO2 provides a more comprehensive platform, adding on the one hand features such as event processing and business rule management, but on the other hand also providing strong support for security features. The latter includes WSO2 API Manager,…

Webinar

Sep 23, 2014: So your business is moving to the Cloud – Will it be Azure or Naked Cloud?

Most companies do not plan their migration to the cloud. They suddenly find that there are multiple users of cloud services in their organisation, each of which was a good idea at the time but now form a disparate approach to cloud services with no strategic vision, a significant training…

Blog

From preventive to detective and corrective IAM

Controls in security and GRC (Governance, Risk Management, and Compliance) systems are commonly structured in preventive, detective, and reactive controls. When we look at IAM/IAG (Identity and Access Management/Governance), we can observe a journey from the initial focus on preventive…

Blog

IBM to acquire CrossIdeas - further expanding its IAM/IAG portfolio

A while ago I blogged about IBM being back as a leader in the IAM/IAG (Identity Access Management/Governance) market. Today the news that IBM is to acquire CrossIdeas, an Italian vendor in the Access Governance market, hit the wire. CrossIdeas is a key player in Access Governance in its…

Executive View

Executive View: BalaBit Shell Control Box - 71123

BalaBit IT Security was founded in 2000 in Hungary, and their first product was an application layer firewall suite called Zorp. Since that time, BalaBit has grown into an international holding headquartered in Luxembourg with sales offices in several European countries, the United States…

Blog

Operation Emmental: another nail in the coffin of SMS-based two-factor authentication

On Tuesday, security company Trend Micro has unveiled a long and detailed report on “Operation Emmental”, an ongoing attack on online banking sites in several countries around the world. This attack is able to bypass the popular mTAN two-factor authentication scheme, which uses SMS messages…

Leadership Compass

Leadership Compass: Cloud User and Access Management - 70969

Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud services and on-premise web applications. Your compass for finding the right path in the market.

Leadership Compass

Leadership Compass: Cloud IAM/IAG - 71121

The Cloud IAM market is currently driven by products that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity…

Executive View

Executive View: Ergon Airlock/Medusa - 71047

Die Ergon Informatik AG ist ein in Zürich ansässiges Unternehmen. Neben einem großen Unternehmensbereich für Software-Individualentwicklungen ist Ergon schon seit vielen Jahren auch als Anbieter von Standard-Software am Markt präsent und hat eine signifikante Zahl…

Executive View

Executive View: Centrify Server Suite - 70886

Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity management and auditing solutions including single sign-on service for multiple devices and for cloud-based applications. The company is VC funded and has…

Executive View

Executive View: Microsoft ADFS: Active Directory Federation Services - 71126

There is a growing demand from organizations for tighter communication and collaboration with external parties and, in some cases, customers. At the same time the rapid growth of cloud services is driving the need for robust and flexible authentication solutions. As the network boundary…

Blog

More questions IAM buyers should ask

Earlier this year, I published the Buyer’s Guide: Access Governance and Provisioning. That document provides condensed information about key selection criteria for Identity Provisioning and Access Governance products, while also posing questions that buyers should ask of vendors. I focused…

Blog

Extending your Active Directory to the Cloud

Most organizations have a Microsoft Active Directory in place. The Active Directory (or, in short, AD) builds the foundation of their on-premises infrastructure for managing users, performing their primary network authentication and authentication to AD-integrated applications such as…

Executive View

Executive View: NetIQ Identity Manager - 70901

NetIQ is part of the Attachmate Group, which consists of a number of business units, including Novell and Attachmate. NetIQ is the entity, which now markets the former Novell Identity and Access Management products. The core product of NetIQ today is NetIQ Identity Manager, formerly known…

Executive View

Executive View: CA SiteMinder® - 71022

CA SiteMinder® in conjunction with CA SiteMinder® Federation provides secure single sign-on and access management to Web applications and Web services either on-premise, at a partner’s site or in the cloud, from a web browser or a mobile device.

Product Report

Product Report: EmpowerID - 71115

EmpowerID was founded in 2005. The company initially was called The Dot Net Factory. Over the years, EmpowerID grew from a vendor of point solutions for administration of Windows Server and Microsoft Server products to providing an integrated platform that covers a large breadth of IAM/IAG…

Leadership Seminar

Nov 27, 2014: Migration auf eine neue Identity Provisioning Lösung

Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen.

Leadership Seminar

Nov 06, 2014: Federation – Single Sign-On – Cloud IAM

Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren.

Webcast

Patrick Parker - IAM Meat and Potatoes Best Practices

Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany

Webcast

Roy Adar - Mitigate Targeted Attacks with Privileged Account Analytics

Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany

Vendor Report

Vendor Report: Thycotic - 71112

Thycotic is one of the newer vendors in the market segment of Privilege Management. Previously they had been a vendor of various point solutions for system management. Aside from their core product Secret Server, Thycotic still develops and sells two other products which focus on specific…

Leadership Compass

Leadership Compass: Dynamic Authorization Management - 70966

Dynamic Authorization Management is arguably the most exciting area in identity and access management today. It is the way in which organizations leverage their identity and access management environment to control access to restricted resources. Access control to file shares, network…

Advisory Note

Advisory Note: Extending your Active Directory to the Cloud - 71108

Most organizations have Microsoft Active Directory in place. The Active Directory (AD) builds the foundation of their on-premises infrastructure for managing users, performing their primary network authentication and authentication to AD-integrated applications such as Microsoft Exchange…

Executive View

Executive View: Beta Systems SAM Enterprise Identity Manager - 70907

The Beta Systems Software AG (Beta Systems) SAM Enterprise Identity Manager belongs to the category of enterprise provisioning systems with integrated access governance functions. Its core function is to reconcile identity information among different systems based on defined processes and…

Executive View

Executive View: Beta Systems Garancy Access Intelligence Manager - 70906

Mit dem Garancy Access Intelligence Manager hat die Beta Systems AG eine spezialisierte Lösung für die Analyse von Zugriffsberechtigungen auf den Markt gebracht. Wie der Produktname schon sagt, handelt es sich um eine Lösung für „Access Intelligence“, einen…

Advisory Note

Advisory Note: Identity & Access Management/Governance Blueprint - 70839

This blueprint aims to provide an overview of IAM/IAG to the informed user, helping them to better understand the “big picture” of IAM, including technologies such as Identity Provisioning, Access Governance, strong- and risk-based authentication and authorization and Access…

Leadership Seminar

Sep 25, 2014: Migration auf eine neue Identity Provisioning Lösung

Die Gründe, Chancen, Risiken und Zielszenarien einer Migration verstehen und einen Überblick über die Anbieter im Identity Provisioning- und Access Governance-Markt gewinnen.

Leadership Seminar

Oct 01, 2014: Federation – Single Sign-On – Cloud IAM

Mitarbeiter, Kunden, Partner, Lieferanten – Wie Sie unterschiedliche Anwendertypen optimal integrieren.

Webcast

Per Hägerö - Authentication in 2020

Keynote at the European Identity & Cloud Conference 2014 May 13-16, 2014 at Munich, Germany

Advisory Note

Advisory Note: IAM Predictions and Recommendations 2014-2018 - 71120

Identity and Access Management (IAM) is in constant flux. The merging into IAM of Access Governance and Access Control is a relatively new phenomenon with a high rate of growth. Based on new offerings and changing demand, KuppingerCole predicts several major changes in that market. We…

Advisory Note

Advisory Note: Connected Enterprise Step-by-step - 70999

Extending your current Access Management infrastructure gradually to support the emerging requirements of the new ABC – Agile Businesses: Connected – with a standard infrastructure. Supporting Cloud Services, APIs, and more.

Advisory Note

Advisory Note: Trends in Authentication and Authorization - 71043

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

Executive View

Executive View: SailPoint IdentityNow - 70826

Cloud-based IAM (Identity and Access Management) is one of the emerging markets within IAM in particular and Information Security in general. Within the broader Cloud IAM market, we observe a number of solutions that are focused on specific capabilities, such as providing a Single Sign-On…

Executive View

Executive View: Omada Identity Suite - 70828

Omada, a Danish vendor, started as a provider of advanced Identity and Access Management solutions and services back in 2000. The core product of the company is its Omada Identity Suite. Omada focuses on adaptable business-centric and collaborative features such as workflows, attestation and…

Webcast

How to Stop the Insider Threat: Protect Yourself from Privileged Users

KuppingerCole Webinar recording

Executive View

Executive View: PingOne® - 70870

Cloud-based IAM (Identity and Access Management) is one of the emerging markets within IAM in particular and Information Security in general. Within the broader Cloud IAM market, we observe a number of solutions that are focused on specific capabilities, such as providing a Single Sign-On…

Vendor Report

Vendor Report: Dell IAM - 70812

While relatively new to the Identity marketplace, Dell has a long history in technology far exceeding most of its competitors. Its world-wide presence dwarfs most of its competition and includes resellers, VARs and system integrators with a strong knowledge and much experience of the product…

Webcast

Extend your existing Active Directory to the Cloud

KuppingerCole Webinar recording

Webcast

Identity and Access Management: Where to Start?

KuppingerCole Webinar recording

Executive View

Executive View: NetIQ SecureLogin - 71066

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both…

Executive View

Executive View: RSA Aveksa Identity Management & Governance - 70873

Access Governance is about the governance and management of access controls in IT systems and thus about mitigating access-related risks. These risks include the stealing of information, fraud through changing information, and the subverting of IT systems, for example in banking, to…

Executive View

Executive View: Oracle Enterprise Single Sign-On Suite Plus - 71024

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both…

Webcast

Enterprise Single Sign-On - is there still a need for?

KuppingerCole Webinar recording

Leadership Compass

Leadership Compass: Identity Provisioning - 70949

Identity Provisioning is still one of the core segments of the overall IAM market. Identity Provisioning is about provisioning identities and access entitlements to target systems. This includes creating and managing accounts in such connected target systems and associating the accounts…

Blog

Step back and review your IAM program: Why you need to review your IAM/IAG Strategic Planning now

IAM/IAG (Identity Access Management/Governance) is changing. The Computing Troika of Cloud, Mobile, and Social Computing creates new challenges. Different deployment models, new devices and mobile users, and more groups of users to deal with more closely are fundamentally changing the…

Blog

Top Risks of IAM Programmes

IAM risks fit into 4 programme areas, Executive Support, Business Involvement, Strategy and Technology; and one area of the organisation, People. Each of these areas holds a number of risks which must be managed and controlled. 1. Executive Support Risk 1 – Without executive buy-in…

Webcast

Migrating away from your current Identity Provisioning solution

KuppingerCole Webinar recording

Webinar

May 06, 2014: How to stop the Insider Threat: Protect yourself from Privileged Users

The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about external threats, one thing is clear: The biggest threat is internal, and comes from your own users. Whether these are malicious or just human errors,…

Vendor Report

Vendor Report: VASCO Data Security International - 70923

VASCO is a vendor in the Authentication Management market which provides solutions for strong authentication, electronic signing & digital signing. They are known for their broad range of hardware tokens for authentication & signatures and complementary software solutions. In…

Webcast

Mitigate Targeted Attacks with Privileged Account Analytics

KuppingerCole Webinar recording

Advisory Note

Advisory Note: Cloud IAM: More than just Single Sign-On to Cloud Applications - 71031

The Cloud IAM market is currently driven by services that focus on providing Single Sign-On to various Cloud services as their major feature and business benefit. This will change, with two distinct evolutions of more advanced services forming the market: Cloud-based IAM/IAG (Identity…

Advisory Note

Buyer’s Guide: Access Governance and Identity Provisioning - 71030

KuppingerCole Buyer’s Guide for Access Governance and Identity Provisioning as core disciplines of IAM (Identity and Access Management) and IAG (Identity and Access Governance). Criteria to select your vendor. Questions to ask vendors. Requirements for successful deployments. Your…

Seminar

May 23, 2014: KuppingerCole Identity and Access Management Experts Day

Pre-Program: Identity and Access Management - Where to Start? Morning: Access Governance for both on premises applications and Cloud & Mobile Afternoon: Dynamic Externalised Authorisation Management with the move from Role to Policy Based Access control.

Advisory Note

Advisory Note: Access Governance Architectures - 71039

Access Governance is about the management of access controls in IT systems and thus about mitigating access-related risks. These risks include the theft of information, fraud through changes to information, and the subversion of IT systems - for example in banking - to facilitate illegal…

Webinar

Mar 24, 2014: Mitigate targeted attacks with privileged account analytics

Targeted attacks continue to hit the headlines as the pinnacle of cyber-attacks faced by businesses. Once the perimeter defenses fail to defend against targeted attacks, the mitigation focus has shifted to inside the network. Security analytics focused on privileged account activity can…

Advisory Note

Advisory Note: Migration Options for your Legacy Provisioning - 71118

Migrating an existing provisioning system always becomes a red-hot topic once a vendor becomes acquired by another vendor. In these situations - like the acquisition of Novell by NetIQ, of Völcker by Quest Software, of Waveset by Sun Microsystems and then Sun Microsystems by Oracle and…

Executive View

Executive View: IBM Security Access Manager for Enterprise Single Sign-On - 71068

Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in the light of the growing number of Cloud-SSO solutions that manage access to cloud applications, both…

Blog

The end of the Social Login begins: FIDO Alliance, Samsung, and PayPal to redefine authentication

Recently, the FIDO Alliance announced that PayPal and Samsung were enabling consumer payments with fingerprint authentication on the new Samsung Galaxy S5. My valued colleague Dave Kearns and I have written various posts about the FIDO Alliance and the impact we expect they will have on the…

Executive View

Executive View: Oracle Entitlements Server (OES) 11gR2 - 70831

Dynamic Authorization Management for applications based on centrally managed policies, enforced at runtime. Support for existing applications, without any code changes, through the Oracle API Gateway...

Blog

Is there still a need for keeping Identity Provisioning and Access Governance separate?

When looking at the core IAM (Identity and Access Management) market with its main product categories of Identity Provisioning and Access Governance, some customers and vendors currently raise the question of whether there is still a need to keep these product categories separate or whether…

Product Report

Product Report: CrossIdeas IDEAS - 70897

A business-driven approach to Access Governance, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Combining Access Governance and Dynamic Authorization Management. Providing connectivity to target systems…

Blog

Entitlement & Access Governance – the next generation of core IAM

In my new report “Entitlement & Access Governance”, published yesterday, I introduce a new term and abbreviation: EAG for Entitlement & Access Governance. Thanks to Dave Kearns for proposing that term – I like it because it reflects what this is about. EAG describes approaches that…

Product Report

Product Report: CA IdentityMinder™ - 70914

CA Technologies is amongst the largest infrastructure software vendors worldwide. They offer a broad portfolio of products in the IAM market segment, including CA IdentityMinder™ (formerly CA Identity Manager) as their solution for Identity Provisioning. IdentityMinder™ is built…

Advisory Note

Advisory Note: Entitlement & Access Governance - 71109

Integrating Access Governance, Data Governance, and system-level Fine Grained Access Control to provide a comprehensive approach to requesting, managing, and governing access at all levels. Defining the next maturity level for Access Governance solutions: Entitlement & Access Governance…

Webinar

Apr 29, 2014: Identity and Access Management: Where to start?

Many organizations – of all sizes – still have no or only a rudimentary IAM in place. When looking at IAM, it quickly turns out that this is about more than a single technology.

Webinar

Apr 10, 2014: Enterprise Single Sign-On – is there still a need for?

In this KuppingerCole Webinar, we will look at Enterprise Single Sign-On (E-SSO) and the alternatives. Starting with the use cases for single sign-on and related scenarios, we will analyze the technical alternatives. We look at various aspects such as the time for implementation, the reach…

Executive View

Executive View: SecureKey briidge.net™ - 71016

SecureKey Technologies provides cloud-based, trusted identity networks that enable organizations to deliver online services securely to consumers. SecureKey offers a suite of cloud based services for consumer and citizen authentication under the trademarked name of briidge.net™. There…

Webinar

Apr 08, 2014: Migrating away from your current Identity Provisioning solution

Many organizations currently consider migrating away from their current Identity Provisioning solution. There are many reasons to do so: vendors became acquired and the roadmap changed; the requirements have changed and the current solution does not appear being a perfect fit anymore; a lot…

Leadership Compass

Leadership Compass: Enterprise Single Sign-On - 70962

The Leadership Compass shows that Enterprise Single Sign-On is a rather mature market. Especially in the areas of Product Leadership and Innovation Leadership, many vendors are leading-edge and competing head-to-head. This is good news for customers, allowing them to choose from a range of…

Leadership Compass

Leadership Compass: Privilege Management - 70960

This Leadership Compass provides an overview and analysis of the Privilege Management market segment, sometimes referred to as Privileged Identity Management, Privileged Account Management, etc. Technologies typically support Privilege Management as a password repository approach (commonly…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance

If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company, then you should read on. In any case, you probably should read on because this is a trend that is becoming increasingly important in times of growing uncertainty and loss of trust – in contracts, in companies in the supply chain, in "the Internet", and in nation-states. Trust as the foundation for [...]