EU Digital Identity Wallet (DIW) and the risk of over-sharing data
How does the EU Digital Identity Wallet change the risk of over-sharing data? A Dutch perspective. How does the EU Digital Identity Wallet (EU DIW) change the [...]
How does the EU Digital Identity Wallet change the risk of over-sharing data? A Dutch perspective. How does the EU Digital Identity Wallet (EU DIW) change the [...]
The State of the EU Digital Identity Wallet - Expert survey report The European Union aims for a highly secure, trustworthy, and empowering cross-border digital identification and [...]
Unser erstes ISO27001 Kontrollaudit Ein Jahr nach unserer ISO 27001-Zertifizierung für Informationssicherheit haben wir jetzt unser erstes Kontrollaudit mit Bravour bestanden. Im kommenden Jahr folgt das nächste und 2025 [...]
Governance of things - II IGA versus CMDB (Identity Governance Administration v.s. Configuration Management Database) In my previous blog, I discussed the topic of managing the digital identity of devices, [...]
The rediscovery of information security This blog has been due for quite some time. Ever since new privacy regulations have come into play, data breaches in (online) information systems [...]
Non-human workers need access rights too! The Rise of Non-Human Workers in Organizations As an increasing number of devices, machinery, and robots are integrated into the infrastructure of organizations, [...]