Identity and Access Management News

Exploring Decentralization: Unbreaking the Internet

Exploring Decentralization: Unbreaking the Internet

Peer-to-peer digital tools such as blockchain technology offer an opportunity for an opening a dispersion of power and information, and profound possibilities for collaboration on as-yet-unseen scales. Peer-to-peer networks are participatory systems that resist...

read more
IdRamp to sponsor the Internet Identity Workshop

IdRamp to sponsor the Internet Identity Workshop

IdRamp will sponsor and present at the next Internet Identity Workshop (IIW)  April 30, 2019 – May 2, 2019 at the Computer History Museum in  Mountain View California. The Internet Identity Workshop has been finding, probing and solving identity issues twice every...

read more
IdRamp AGiD selected by the ISU Startup Factory

IdRamp AGiD selected by the ISU Startup Factory

IdRamp AGiD has been selected to be a part of the award-winning Iowa State University Startup Factory program. Startups accepted into the program receive formal resources and access to a network of mentors, advisors and investors. The program is divided into two...

read more
NIST Guide Demonstrates How to Control Privileged Accounts

NIST Guide Demonstrates How to Control Privileged Accounts

Over the past few months ​IdRamp has been working closely with The National Cybersecurity Center of Excellence (NCCoE) to develop the National Institute of Standards (NIST) practice guide for Privileged Account Management. The guide will help improve security...

read more
History of Identity Management Infographic

History of Identity Management Infographic

Idramp presents the future history of identity and access management. History of Identity and Access Management (text version) 1853 First Birth Certificates - Compulsory registration of births within the United Kingdom government originated as far back as 1853. The...

read more
Electric Utilities Identity Management

Electric Utilities Identity Management

Identity and access management design The National Cybersecurity Center of Excellence (NCCoE) has published an example solution architecture guide that electric utilities and enterprises can use to more securely and efficiently manage access to the networked devices...

read more
68% of data breaches take months or longer to discover

68% of data breaches take months or longer to discover

Data Breach Investigations The eleventh annual Verizon Data Breach Investigations Report (DBIR) provides valuable insight for the Identity and Access Management community.  The research is based on analysis of over 50,000 real-world incidents, and over 2000 confirmed...

read more
Mobile Blockchain Identity Management

Mobile Blockchain Identity Management

Mobile Authentication Taskforce The evolution of blockchain is transforming every aspect of cyber security including mobile identity and access management.  AT&T, Sprint, T-Mobile and Verizon formed the Mobile Authentication Taskforce last year to protect...

read more