authorisation
One identity Survey shows hackers getting months to exploit old IT users’ accounts
One Identity, a in helping organisations get identity and access management (IAM) right, released study results showing significant gaps in how organisations manage accounts used to access IT infrastructure, systems, and data—gaps that could result in major security and compliance deficiencies.
Read moreThe ‘First Receiver’ concept. Part 2: The enabling architecture
The first receiver concept is predicated on the ability to leverage — to the hilt — the value of IoT data and it’s being enabled by an event-driven, publish and subscribe deployment architecture that takes what’s technologically possible and makes it practical.
Read moreOngoing trends in IoT device lifecycle management
Today, the number of connected devices is set to overtake the world’s human population. This connected devices ecosystem is what we popularly call the Internet of Things or IoT.
Read moreA ‘common security model’ against typical hazards in the IoT
Up to now, individuals have generally been using a dedicated computer for work; now, however, the Internet of Things (IoT), with billions of networked devices that are for the most part not monitored by humans, presents enormous inherent security risks.
Read more