The Importance of Sticking to Your (Information) Security Policies and Procedures When Outsourcing

The recent classified data breach in Sweden is destabilizing the government. The story that has gradually been breaking out this summer is quite astonishing. At the time of the writing of this blog the Swedish government is regrouping after the … Read More

Hacking a Tokomak Drone

In the distant future far away humanity has conquered faster than light travel, and colonised star systems surrounding the birth place of the intelligent ape. The AI (r)evolution enabled humans to accelerate science and engineering efforts and in a relatively … Read More

The Danger of Relying on IAM When You Need CIAM

In a recent blog post Ed Sawma from Okta outlines how IAM and CIAM are the same, and not the same. Reading through the post you might get a warm and fuzzy feeling inside that says typical (Enterprise) IAM solutions … Read More

Identity Cloud

What is Ubisecure Identity Cloud?

Ubisecure’s Identity and Access Management platform provides a powerful and flexible user management data model, enabling delegation of access rights across organization boundaries. This capability supports digitalization initiatives around Industrial IoT and omnichannel commerce. The platform also provides a broad … Read More

The New NIST Digital Identity Guidelines (SP 800-63-3)

NIST (National Institute of Standards and Technology) published the new guidelines on digital identity on June 22nd, 2017. The most notable change is the retirement of the concept of Level of Assurance (LoA) as an evaluation criteria when it comes … Read More

The Difference Between SAML 2.0 and OAuth 2.0

In this blog entry we’ll take a little deeper look at the most prevailing standards for the use case of granting access to an online application. We’ll discover what is the difference between SAML 2.0 and OAuth 2.0. SAML (Security … Read More