Understanding the Role of SCIM in SaaS, Workflow, and Identi... June 2023 by Rajan Barara

With the explosion of Software as a service applications, organizations are juggling a lot –…

Decentralized Identity – Know Your Customer (Kyc) January 2023 by Rajan Barara

It is a well-established fact that credential theft is the most common attack vector cybercriminals…

Securing Your Organization with a Credentials-Based Password... August 2020 by Rajan Barara

Looking at the history of passwords, one realizes that they have been around for centuries…

“Zoombombing”: What Is it and How Do You Avoid it? April 2020 by Rajan Barara

If you’ve been keeping up on the COVID-19 news, you’ve probably heard about a form…

It All Starts with Identity July 2018 by Rajan Barara

Identity: the key factor when it comes to verifying who you are and what you…

Multi-factor authentication is a commodity play. What now? April 2018 by Rajan Barara

Soft tokens, Mobile push notification and one-time passwords (OTPs) combined with cloud and mobile have…

  • Sort by

  • Topic