Blog

20th September, 2017

Dear CISOs: is it time to review your IAM strategy?

Another data breach led by the lack of a proper IAM strategy. How many other breaches will happen before IAM will finally enter into the business and technical mindset of the companies?

12th September, 2017

Implementing IAM for your GDPR strategy

Working on the Swiss market in the IT security field, especially with Identity & Access Management technologies, I am receiving frequently this question: How Identity & Access Management can bring you closer to the GDPR compliancy?

29th August, 2017

GDPR terminology in a nutshell

When a new regulation comes up, when a new directive has to be applied, when any kind of legal changes occur, everybody speaks about the consequences, procedures, but just a few of us takes really care about the content.

23rd August, 2017

I have nothing to hide

Still in these days I'm keeping listening people telling me that for them privacy is not important because they don't have anything to hide, but the discussion is much more complex than this..

11th July, 2017

Spear Ransomware: Part1

Part 1: This is the first of three parts about the article. We will see together how target ransomware are developing on Internet, to understand how they are evolving and what we could expect next

19th December, 2016

Yahoo: a breach's story

New discovers about the attack to Yahoo in November 2014: apparently the attack started in August 2013, where also passwords and other sensible data were compromised, including the source code of Yahoo that allowed the second attack that allowed to bypass the authentication to the portal.

6th December, 2016

UK: a legalized privacy violation

Tuesday the 29th of November in Great Britain has been approved a new law that extends the online surveillance powers of the government and the police over the citizens. The law, called 'Investigatory Powers Act 2016', obtained the 'royal assent', that means that has been approved by the Queen, therefore it is already active.

25th November, 2016

Yahoo: the breach still echos

In November 2014 the database of Yahoo was violated by hackers that were able to penetrate the systems. The vulnerability allowed them to steal confidential information for more than 500 million accounts, but Yahoo disclosure this information to the public only in September 2016, almost 2 years later.

15th November, 2016

Privileged Identity Management principles

Introduction to the Privileged Identity Management concepts like the SoD and the Chinese Wall, plus some application commonly used in the market.

10th November, 2016

Biometric: The French Big Brother

Without grabbing the attention of the population, in France it has been approved a decree that will allow the creation of a huge database with the data of 60 million of French citizens that will collect information from the names to the addresses, from the photos to the fingerprints.

3rd November, 2016

Data Privacy: From WhatsApp to Facebook

Why the data shared with Facebook by WhatsApp should be stopped until the usage of these data won't be clarified.

26th October, 2016

The Black Friday of Internet

The Distributed Denial of Service (DDoS) attack that took place on Friday the 21st of October 2016 could be considered the 11th of September of Internet. Without the necessary countermeasures, such attacks are destiny to be repeated.

16th February, 2016

Identity Federation Social Authentication

Introduction to the Privileged Identity Management concepts like the SoD and the Chinese Wall, plus some application commonly used in the market.

9th February, 2016

Identity Federation principles

Introduction to the Privileged Identity Management concepts like the SoD and the Chinese Wall, plus some application commonly used in the market.

19th December, 2015

Quest Defender 2FA

Lets see together what are the main steps to implement a generic connector using Quest One Identity.

12th November, 2015

One Identity generic custom connector

Lets see together what are the main steps to implement a generic connector using Quest One Identity.

Swiss Identity & Access Management experts

Ask for a Demo