ARE PRIVILEGED ACCESS MANAGEMENT (PAM) AND IDENTITY & ACCESS MANAGEMENT (IAM) THE SAME THING?

1st November 2017

Privileged Access Management (PAM) and Identity & Access Management (IAM), they occupy the same space but have very different outcomes.


Why Identity and Access Management should be part of your GDPR plan

19th October 2017

It’s crucial to understand that the General Data Protection Regulation (GDPR) is not a technology issue alone. When it comes into effect on 25 May […]


As GDPR looms – CPO/DPOs can play a lynchpin role

13th October 2017

The enforcement date for the General Data Protection Regulation (GDPR) is approaching rapidly. As we near the 25th May, 2018, deadline it is crucial for […]


It’s time to kill off Knowledge Based Authentication and the Security Question

12th October 2017

By J Connolly Knowledge based authentication (or KBA) is the prompting of secret knowledge from a user in order to prove identity. It is frequently […]


Moving towards Machine Learning for IAM analytics

7th September 2017

By J Connolly Though machine learning (or AI) is the most recent craze in the technology sector, many real-world applications of the technology remain far […]


IAM and IoT: Challenges for the Future

23rd August 2017

By J Connolly. With the expectation that there will be 20.8 billion connected IoT devices by 2020 and with the Internet of Things market predicted […]


Facing the multiplicity of identity providers

17th August 2017

Writing modern, secure, identity enabled apps is a non-trivial undertaking. Customers demand or assume modern mobile or web apps allow them to logon using their […]


Password management—a crucial step in cloud identity management

21st June 2017

Identity management once meant provisioning users and managing their passwords in Active Directory. But as  organisations  add more cloud applications to their IT environment, the process of managing users’ identities is getting more complex. One of the major components of identity management is passwords—often the first line of defence when it comes to securing user accounts.  


Five tips for getting started on your Identity and Access Management strategy

12th June 2017

By Gabriel Wilson; Managing Consultant, Rivington Information Security, written in conjunction with Identity and Access Management specialists Ilex International Managing user access to systems and […]


How to Nagivate the Open Banking Initiative and PSD2

How to Nagivate the Open Banking Initiative and PSD2 The upcoming Open Banking initiative has formed as a result of the Competition and Market Authority’s […]