The State of the EU Digital Identity Wallet – Expert survey report
The State of the EU Digital Identity Wallet - Expert survey report Through member states, the European Union aims to realize a highly secure, trustworthy, and empowering [...]
The State of the EU Digital Identity Wallet - Expert survey report Through member states, the European Union aims to realize a highly secure, trustworthy, and empowering [...]
SonicBee moved to ./Dotslash Utrecht We have moved to ./dotslash Utrecht. From now on, you can find us amidst this dynamic scale-up hub. This move marks the end of [...]
First control audit for our ISO 27001 certification A year after achieving our ISO 27001 certification, we recently underwent our first control audit. And we're thrilled to report a [...]
We proudly present our Advisory Services! Empowering organizations to create interoperability for smart and secure collaboration Half a year ago, we started SonicBee with our mission: “Empower organizations to [...]
SonicBee celebrates first anniversary! As a starting and growing business you are always occupied with the future. You have to set up and plan activities, estimate turnover and cost [...]
We proudly present our IAM training courses! Who can do what and why is that? That is the core question of information security that is central to the field [...]
Governance of things - II IGA versus CMDB (Identity Governance Administration v.s. Configuration Management Database) In my previous blog, I discussed the topic of managing the digital identity of devices, [...]
Governance of things More and more non-human accounts are appearing in organizations. Accounts that belong to things, robots, RPAs (Robotic Process Automation components), devices, sensors and what not. Accounts that need access to systems, processes, [...]
New HQ for SonicBee Our New Office in Amsterdan As of today, SonicBee has a head office at Kraanspoor 50 in Amsterdam. Our new office offers a panoramic view [...]
The rediscovery of information security This blog has been due for quite some time. Since new privacy regulations have come into play, data breaches in (online) information systems have [...]