Electric Utilities Identity Management

Identity and access management design The National Cybersecurity Center of Excellence (NCCoE) has published an example solution architecture guide that electric utilities and enterprises can use to more securely and efficiently manage access to the networked devices...

40% of businesses experienced a security breach in the past year

Cyber Security Breaches Survey The 2018 Cyber Security Breaches Survey published by the UK Statistics Authority provides critical insight into the dire state of Cyber Security.  As companies increase the amount of data retained they become priority attack targets....

68% of data breaches take months or longer to discover

Data Breach Investigations The eleventh annual Verizon Data Breach Investigations Report (DBIR) provides valuable insight for the Identity and Access Management community.  The research is based on analysis of over 50,000 real-world incidents, and over 2000 confirmed...

Mobile Blockchain Identity Management

Software Integration Mobile Authentication Taskforce The evolution of blockchain is transforming every aspect of cyber security including mobile identity and access management.  AT&T, Sprint, T-Mobile and Verizon formed the Mobile Authentication Taskforce last...

Decentralized Identity Strategy

The Problem? Enterprises are recognizing that a centralized identity model is difficult to sustain. The number of digital identities and types of application relationships grow faster than what the enterprise can adequately respond to. The Solution = Decentralized...