Apple’s two factor authentication isn’t what it seems…

5th September 2014

The enablement of two-factor authentication (TFA) is one of the common nuggets of advice being used post-iCloud hacking scandal. Whilst good advice, in hinesight it […]


Creating an Uber customer experience multiverse – ForgeRock

2nd September 2014

A fascinating deal was inked last week between Uber and Expensify. Customers are now able to order Uber cars based on their Expensify reservation submissions. […]


Cloud Data Security: Is your company its own worst enemy?

29th August 2014

Often in life people will make a decision that is detrimental to their situation. Sometimes it is best to take a step back and see […]


Have a risk-based approach to identity management

29th July 2014

KPMG’s information protection and business resilience director, Martijn Verbree, claims that a risk-based approach is the best strategy for tackling identity and access management in […]


Replacing sign-on with smartphone swipes

25th July 2014

One company believes it may have the answer in the post-password era. PingID from Ping Identity aims to use the smartphone of an enterprise user […]


Will UK citizens be more attractive to hackers post-Drip law?

18th July 2014

The Data Retention and Investigatory Powers (Drip) bill that was recently cleared by the House of Lords will make the communications data of UK citizens […]


Whitehall Media’s 9th biannual Identity Management (IDM) conference, London

24th June 2014

Chaired by Steve Gold from Netcomms, Whitehall Media’s 9th biannual Identity Management conference on 18 June 2014 attracted hundreds of delegates from across different sectors […]


Intermedia Presents at Identity Management Conference 2014

16th June 2014

SVP of Identity Access Management discusses how CIOs can embrace the cloud without losing control Reading, UK – June 16, 2014 – Intermedia, the world’s […]


What does the future hold for Identity Management?

30th April 2014

Identity and Access Management (IAM) is no longer the sole preserve of highly technical staff in corporate IT departments. The modern security, risk management and […]


Identity and Access Management (IAM) in 2014: What’s in store?

21st January 2014

Identity Management is becoming a complex domain. With the advent of cloud, mobile, social and personal networks, there are now a plethora of identities, platforms, […]