A Guide to Complete Zero Trust – How Forrester and Google have made Zero Trust mainstream?
In this third part of our blog on “A Guide to Complete Zero Trust”, we delve deeper into the historical aspects of the concept of Zero Trust.
In this third part of our blog on “A Guide to Complete Zero Trust”, we delve deeper into the historical aspects of the concept of Zero Trust.
The IT landscape has indeed changed massively in recent years. In this second blog in our “A Guide to Complete Zero Trust” blog series, we take a closer look at two of the biggest changes in recent years and analyze what impact these changes are having on IT security.
For some years now, the entire IT sector has been in a state of upheaval, which has triggered simultaneously a paradigm shift in IT security; consequently, the IT security concept ‘Zero Trust’ has acquired immense importance.
A Guide to Complete Zero Trust – What is ‘Zero Trust’ and why do we need it? Read More »
Group management and identity providers (IdPs) are success factors for SaaS providers – Customer Identity & Access Management with cidaas
Software as a Service (SaaS) is the future for many software solutions – there are many reasons for this, including quick and easy setup, low maintenance, and fast availability of new features. There is much to be said for the use of SaaS solutions. But what do SaaS providers have to do to inspire customers? Enthusiasm (also known as Attractive Qualities) decides today more than ever about winning and losing customers.
Great moments of official recognition for cidaas ID Validator! Automated video identification with AutoIdent by cidaas ID Validator will be TKG compliant as soon as the new TKG amendment becomes legally effective, i.e., by December 1, 2021.
What is the OAuth 2.0 Authorization Code – PKCE Grant? – PKCE = best for Single Page Applications (SPA) – More in the take a auth-shot blog 📚
Take a auth-shot – PKCE Grant Read More »
The top 3 IT security trends in 2021 and what you need to do now to be secure and ready for the digitalization – Read more in our cidaas blog.
Top 3 IT security trends in 2021 and what you need to do now Read More »
What is a client credentials grant? how does it work? And what use cases is it designed for? – Answers in our take a auth-shot blog 📚
take a auth-shot – Client-Credentials Grant Read More »
The top 5 must-see exhibitors at the IT security event it-sa 2021. Be it pentesting, secure file sharing or the modern cloud identity & access management cidaas!
Top 5 must-see exhibitors at it-sa 2021! Read More »