Kundinriktad IAM – i kärnan av all digitaliserings utveckling

Varför inspirerar kundinriktad IAM? Jag blev nyligen tillfrågad varför kundinriktad IAM så tydligt inspirerar oss på Ubisecure. Det var en intressant fråga som gav orsak till en del självreflektion. Här tänkte jag helt kort dela med mig en aning av … Read More

Featured Post

GDPR Configuration Tip #2 – Minimum information collection and disclosure

In this series we look at practical tips on how to configure the Ubisecure Identity Platform for GDPR compliance. This second entry deals with GDPR compliance in terms of data collection and disclosure and how your organization can move towards … Read More

Featured Post
Identity Cloud

Location, Location, Location!

New house, new job, your next holiday even, location has always been an important part of the decision making process. When it comes to powering your business, location is important too. Cloud hosted Software as a Service is nothing new, … Read More

Featured Post

The Importance of Sticking to Your (Information) Security Policies and Procedures When Outsourcing

The recent classified data breach in Sweden is destabilizing the government. The story that has gradually been breaking out this summer is quite astonishing. At the time of the writing of this blog the Swedish government is regrouping after the … Read More

Featured Post

Hacking a Tokomak Drone

In the distant future far away humanity has conquered faster than light travel, and colonised star systems surrounding the birth place of the intelligent ape. The AI (r)evolution enabled humans to accelerate science and engineering efforts and in a relatively … Read More

Featured Post

The Danger of Relying on IAM When You Need CIAM

In a recent blog post Ed Sawma from Okta outlines how IAM and CIAM are the same, and not the same. Reading through the post you might get a warm and fuzzy feeling inside that says typical (Enterprise) IAM solutions … Read More

Featured Post
Identity Cloud

What is Ubisecure Identity Cloud?

Ubisecure’s Identity and Access Management platform provides a powerful and flexible user management data model, enabling delegation of access rights across organization boundaries. This capability supports digitalization initiatives around Industrial IoT and omnichannel commerce. The platform also provides a broad … Read More

Featured Post

The New NIST Digital Identity Guidelines (SP 800-63-3)

NIST (National Institute of Standards and Technology) published the new guidelines on digital identity on June 22nd, 2017. The most notable change is the retirement of the concept of Level of Assurance (LoA) as an evaluation criteria when it comes … Read More

Featured Post

The Difference Between SAML 2.0 and OAuth 2.0

In this blog entry we’ll take a little deeper look at the most prevailing standards for the use case of granting access to an online application. We’ll discover what is the difference between SAML 2.0 and OAuth 2.0. SAML (Security … Read More

Featured Post

There’s no silver bullet for GDPR compliance

General Data Protection Regulation compliance date is less than 330 days from now. Infosec corporate marketing social media feeds are filled with “How to become GDPR compliant” or similar marketing messages. Our blog and feeds have regularly had GDPR related … Read More

Featured Post