Facing the multiplicity of identity providers

17th August 2017

Writing modern, secure, identity enabled apps is a non-trivial undertaking. Customers demand or assume modern mobile or web apps allow them to logon using their […]


Password management—a crucial step in cloud identity management

21st June 2017

Identity management once meant provisioning users and managing their passwords in Active Directory. But as  organisations  add more cloud applications to their IT environment, the process of managing users’ identities is getting more complex. One of the major components of identity management is passwords—often the first line of defence when it comes to securing user accounts.  


Five tips for getting started on your Identity and Access Management strategy

12th June 2017

By Gabriel Wilson; Managing Consultant, Rivington Information Security, written in conjunction with Identity and Access Management specialists Ilex International Managing user access to systems and […]


How to Nagivate the Open Banking Initiative and PSD2

How to Nagivate the Open Banking Initiative and PSD2 The upcoming Open Banking initiative has formed as a result of the Competition and Market Authority’s […]


Consent Management with GDPR in mind

7th June 2017

Posted by Corné van Rooij, iWelcome, www.iwelcome.com As we all know, GDPR will have a big impact on Consumer IAM projects. One of the typical […]


Is the EU GDPR the Y2K of Digital Marketing? – posted by Gigya

4th November 2016

Remember the great Y2K scare of the late 1990s? Civilisation was supposedly going to grind to a halt at 12:01 a.m. on January 1, 2000, […]


Survey Says — You’re Probably Not Prepared for the EU GDPR – posted by Gigya

Dell recently dropped a bomb on the digital business community (read: the business community) in the form of a press release and report based on […]


Major UK banks failing to provide adequate security to customers

On behalf of: Steve Mullan, UK Operations Manager, Ilex International Research conducted by consumer group Which? has highlighted serious concerns over the security provided to […]


How to establish your functional requirements for an Identity and Access Management System

1st November 2016

In order for organisations to determine the effectiveness and efficiency of their identity and access management (IAM) systems, they first need to assess the extent […]


How to develop your business case for investment in identity and access management

10th October 2016

There is no doubt that identity and access management (IAM) offers a multitude of business enhancement opportunities. It is crucial that this management discipline is […]