Skip to main content

Blog Posts: Identity & Access Management

Mobile ID Verification in a Trusted Identity Assurance Platf... October 2018 by Jacquelyn Painter

53% of companies use four or more types of authentication to identify internal users. A recent…

Derived PIV Credentials – Making its way to Mobile August 2018

NCCoE has recently released the second draft of the NIST Cybersecurity Practice Guide SP1800-12, Derived…

We put a Smart Card inside a mobile device August 2018 by Mike Moir

Let’s state the obvious; mobile devices are awesome. The answers to all of our questions…

Singapore Healthcare Breach August 2018 by Mike Byrnes

Breaches and data thefts happen every day, but one incident uncovered in late July in…

Implementing PSD2 – Three Critical Criteria to Conside... July 2018 by Jacquelyn Painter

Are you ready for PSD2? As we are already halfway through the 2018 calendar year,…

It All Starts with Identity July 2018 by Rajan Barara

Identity: the key factor when it comes to verifying who you are and what you…

How GDPR improves the user experience June 2018 by Jacquelyn Painter

There seems to be a misconception that added security regulations result in more friction, costs…

Leopard Spots and Zebra Stripes: Big Data and Identity Manag... June 2018 by Juan C. Asenjo

The expression “a leopard cannot change its spots” maintains that it is challenging to alter…

Leopard Spots and Zebra Stripes: Fraud and Behavioral Analyt... June 2018 by Sandra Carielli

Did you know that every zebra has its own unique stripe pattern? Just like a…

Mobile Smart Credential Supports Today’s Most Popular Mobi... May 2018 by Mike Byrnes

Our award-winning Mobile Smart Credential application, which transforms your mobile phone into a virtual smart…

  • Sort by

  • Topic