Consumer Identity Management – 10 Key Things You Need To KnowBy Subhash Nukala On 25 Nov 2016
Consumer Identity Management (CIM) or Consumer Identity and Access Management (CIAM) is slowly becoming the core of modern Business because it allows businesses to create a single view of the customer, independent of how many systems are present. This single...
Choosing the best IAM Suite for your Organization: Criteria ChecklistBy Subhash Nukala On 27 Oct 2015
An Identity and Access Management solution (IAM) can make or break your organization’s security posture. There is no one ‘right’ solution since the solution that you choose will depend on any number of factors: the size of your organization (will...
Access Governance: What it is and Why you Need itBy Subhash Nukala On 11 Sep 2015
Access governance, as the phrase suggests, refers to the governance or control of who has permission to access what in an organization. Any organization grants access to different employees, based on their designation/role/need; and this process demands comprehensive governance. Why...
IoT by ExampleBy Subhash Nukala On 22 Apr 2015
B. K. Yoon, Samsung's co-CEO took to the stage at CES 2015 to declare that all Samsung's products will be Internet-of-Things (IoT) enabled within five years. That being said, what is more interesting is that he said that 90% of...
Internet of Things – Security: What, Why and HowBy Subhash Nukala On 31 Mar 2015
By definition Internet of Things (IoT) is: A proposed development of the internet in which everyday objects have network connectivity, allowing them to send and receive data. Telephones, automobiles, refrigerators and seemingly anything that can host a computer chip are...
These blogs might interest you
Zero Trust Networks offer protection against many data breaches, but the way to them can be difficult
by Jyoti Bilgoji on 22 May 2019
by Viswanath Subramaniam on 29 Mar 2019
by Yogesh Thippeswamy on 28 Mar 2019
by Arsalaan Kashif on 15 Mar 2019
Subscribe for blog updates