Five best practices for managing account access

28th April 2016

Recent research has found that 59 percent of the UK workforce is actively looking for a new job in 2016 . Ilex International’s report, ‘Staff […]


The Panama Leaks: What can we learn?

On Sunday, 3rd April the world was alerted to a previously unprecedented breach of over 11 million documents, stolen from Panamanian law firm Mossack Fonseca. […]


PostNL a seamless customer experience and secure access

14th April 2016

A customer-friendly platform with Single Sign-On capabilitiesPostNL is the leading mail, parcel and e-commerce corporation in Benelux, with mail and parcel networks also in Germany, […]


Koninklijke Bibliotheek selects iWelcome as authentication service for the digital library

6th April 2016

Koninklijke Bibliotheek (KB), the National Library of the Netherlands, brings people and information together. To that end, KB makes the Dutch library collection visible, sustainable […]


This week in online security breaches

4th December 2015

Weatherspoon has become the latest in a long line of companies to admit they have been hacked and customer data has been stolen. One hundred […]


How quickly do you close dormant accounts?

11th November 2015

New research raises concerns for businesses leaving the door open Commissioned by Ilex, the latest YouGov research has uncovered the reality of orphan accounts and […]


The ABC of UBA

6th November 2015

Cyber attacks today are increasingly complex and well targeted. Recent high-profile breaches such as TalkTalk or Ashley Madison, were carefully planned and went undetected for […]


What does Single Sign On mean to you?

5th November 2015

ProofID, identity and access management specialists, have been working with a customer reviewing their existing Single Sign On (SSO) setup in order to make recommendations […]


The business world’s riskiest user

29th October 2015

The New York Post recently broke this incredible news: the AOL email account of the Director of the CIA was hacked. By a teen. Who […]


Managing the Insider Threat from the ‘Super Users’

27th October 2015

BalaBit discusses how to manage the growing threat of ‘insider threats’ In a growing number of security incidents, privileged users are to blame for system […]