Introduction to Privileged Access Management

Introduction to Privileged Access Management The security of our digital spaces is paramount in our interconnected world, a fact underscored in this new insightful piece, "Introduction to [...]

Introduction to Privileged Access Management2024-09-18T12:46:24+02:00

Holacracy and IAM, does that work?

Holacracy and IAM, that doesn't work together, does it? Chief Evangelist André Koot has been focusing on the domain of Identity and Access Management (IAM) for 20 years. [...]

Holacracy and IAM, does that work?2023-11-02T13:36:29+01:00

NIS2 needs IAM, even though it is not mentioned

NIS2 needs IAM, even though it is not mentioned Introduction The Network and Information Systems (NIS) 2 Directive is the new EU cybersecurity directive that aims to increase the [...]

NIS2 needs IAM, even though it is not mentioned2023-11-02T13:29:24+01:00

You need a masterplan for IAM

You need a masterplan for IAM ‘We’re not flying, it may take a while…’ Recently a lot of flights were cancelled in the United States due to bad [...]

You need a masterplan for IAM2023-11-02T13:14:31+01:00

Strategic alignment and access governance

Strategic alignment and access governance In today’s digital age, for an organization to succeed, it must have a strong IT function. That IT function will not be at its [...]

Strategic alignment and access governance2023-10-03T16:14:00+02:00

Common mistakes when implementing IAM software

Common mistakes when implementing IAM software Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His message is clear. [...]

Common mistakes when implementing IAM software2023-08-28T15:51:45+02:00
Go to Top