Single Sign-On vs Step-up Authentication

When delivering online services to your customers, there are two terms that come up quite often that might require some explanation through comparison. Single Sign-On and Step-up authentication are technologies to help your customers navigate your applications. Visually, Single Sign-On … Read More

Featured Post

Why Smart Cities Services Need Federated Access

Clean sidewalks, safe roads, green parks, pure air. That is the dream of a city in which their inhabitants enjoy walking, jogging, commuting, sightseeing, meeting people at the boulevard. But, what happens when the cities grow at a such unstoppable … Read More

Featured Post

European e-privacy regulation

As the name says, the European e-privacy regulation, replaces the 2002 (revised, 2009) e-privacy directive with a new instrument, turning a directive into a regulation. As a reminder, directive is a regulatory instrument that has to be implemented in each … Read More

Featured Post

API Security and CIAM

While browsing through LinkedIn, I came across this table in a post from Mark O’Neill, an analyst from Gartner. Looking at his very brief post promoting their $195 research note, I realised that at least one third of (their) view … Read More

Featured Post
Industrial Internet

IAM and Industrial Internet – Cryptographic identities for devices

Cryptography, and asymmetric aka public key cryptography in particular still radiates an aura of mystery and confusion. Public key cryptography is far from bleeding-edge though, as it was discovered in 1970 by James Ellis, a British cryptographer working for the … Read More

Featured Post
100th year of independence

Birth of a Nation

Finland was born 99 years and 364 days ago. Tomorrow we celebrate our 100th year of independence. Finland separated from the Russian empire during their own revolution, and was eventually recognised as an independent nation by their leader, Vladimir Lenin … Read More

Featured Post
What is federation?

Federation Networks

We have quite a few articles that discuss different aspects of federation. We’ve provided you with the basic information, talked about the differences between an older protocol (SAML) and the new(er) kid on the block (OAuth), and introduced you to … Read More

Featured Post

Ubisecure New Employee: Sami Lindgren

We are growing and as a result we have many new employees who have started working here at Ubisecure. This is a blog series that will showcase our new superstars and get u a change to know them. They have … Read More

Featured Post

IAM and Industrial Internet – Strong device identities

When it comes to IoT, it is paramount to distinguish between authentication and authorisation. Typically, there are long discussions centred around device identities – authentication – while managing their access rights waved by one sentence such as “the portal will … Read More

Featured Post

Cyber Security Month 2017

October was the global cyber security month 2017. Looking back, it seems that it should’ve been named cyber insecurity month. For some reason it felt like October provided bad infosec news on a daily basis. On one particular Monday I … Read More

Featured Post