Categories
Blog

No Marc, not this time…

The rise of federated identities (Google, Facebook, eID, itsme, …) made onboarding in CIAM (Customer Identity and Access Management)...

Lees meer

Decentralized Identity: Returning Control To Users (part 2)

In this session, we’ll explore the basics of Decentralized Identity (DID), a transformative concept that aims to return control of...

Lees meer

Decentralized Identity: Returning Control To Users (part 1)

In this session, we’ll explore the basics of Decentralized Identity (DID), a transformative concept that aims to return control of...

Lees meer

This is the sound of C

Under the hood there isn’t really a huge difference between CIAM (Customer Identity and Access Management) and IAM (Identity and Access...

Lees meer

Is there an Orchestrator in the room?

IAM (Identity and Access Management) is all about giving people access to resources they either need for their work or simply for daily...

Lees meer

IAM will be Right-BAC

About two decades ago IAM (Identity & Access Management) saw the light of day. Traditional firewalls that were aimed at keeping the bad...

Lees meer
I know my organization is at risk, but where do I start?

I know my organization is at risk, but where do I start?

Cyber security is hot and not without reason. The increased risks are partly due to the far-reaching connectivity with a whole range of...

Lees meer
"As an 'eternal student', I'm in the right place at Resilient Security"

“As an ‘eternal student’, I’m in the right place at Resilient Security”

In ICT almost everything revolves around logic. The fact that Gert Laureys decided to enter the ICT world after studying psychology seems...

Lees meer
Outperforming cyber criminals is what keeps us going

Outperforming cyber criminals is what keeps us going

Although we often don’t get around to it due to busyness, it’s sometimes good to ask ourselves why we do what we do. And why we...

Lees meer

Spikes en Resilient Security bundelen krachten latest

Nieuw partnership zorgt voor andere kijk op cybersecurity: Spikes en Resilient Security doen organisaties productief, slim én veilig...

Lees meer