Introduction to Privileged Access Management
Introduction to Privileged Access Management The security of our digital spaces is paramount in our interconnected world, a fact underscored in this new insightful piece, "Introduction to [...]
Introduction to Privileged Access Management The security of our digital spaces is paramount in our interconnected world, a fact underscored in this new insightful piece, "Introduction to [...]
Holacracy and IAM, that doesn't work together, does it? Chief Evangelist André Koot has been focusing on the domain of Identity and Access Management (IAM) for 20 years. [...]
NIS2 needs IAM, even though it is not mentioned Introduction The Network and Information Systems (NIS) 2 Directive is the new EU cybersecurity directive that aims to increase the [...]
You need a masterplan for IAM ‘We’re not flying, it may take a while…’ Recently a lot of flights were cancelled in the United States due to bad [...]
Strategic alignment and access governance In today’s digital age, for an organization to succeed, it must have a strong IT function. That IT function will not be at its [...]
Common mistakes when implementing IAM software Chief Evangelist André Koot has been focusing on the field of Identity and Access management for 20 years. His message is clear. [...]