Identity

person s hand reaching out to a light

Implementing Fine-Grained Access (#FGA) Control with Relationship-Based Access Control (#ReBAC) in Open Policy Agent (#OPA)

Open Policy Agent (OPA) is a powerful open source policy engine that can be used to enforce access control policies in cloud-native applications. OPA is highly flexible and extensible, and it can be used to implement a wide range of authorization policies. In this blog post, we will show how to implement fine-grained access control

Implementing Fine-Grained Access (#FGA) Control with Relationship-Based Access Control (#ReBAC) in Open Policy Agent (#OPA) Read More »

From Data Goldmine to Data Minefield: Navigating the Risks of Personal Data

Introduction As Chief Information Officer (CIO) or Customer Identity and Access Management (CIAM) leader, it’s essential to understand the current nature of how organizations collect personal data about their consumers, which includes both direct and indirect methods such as tracking cookies, social media mining, customer surveys, and purchase history analysis. While this wealth of data

From Data Goldmine to Data Minefield: Navigating the Risks of Personal Data Read More »

Protecting Your Customers’ Identities: A New CIO’s Guide to Understanding CIAM Attack Vectors and Reducing Your Risks

April 25, 2023 Introduction As a cybersecurity professional, I’ve seen firsthand how important it is for businesses to have strong customer identity and access management (CIAM) systems in place. These systems allow companies to provide secure access to their products and services, while also protecting their customers’ sensitive information. However, with the rise of sophisticated

Protecting Your Customers’ Identities: A New CIO’s Guide to Understanding CIAM Attack Vectors and Reducing Your Risks Read More »

Transforming Your CIAM Program: A New CIO’s Guide to Building a Product-Led Team

Introduction As a new Chief Information Officer (CIO), you may be tasked with modernizing your organization’s Customer Identity and Access Management (CIAM) program. A key component of this transformation is transitioning towards a product-led approach, which emphasizes customer-centricity, agility, and cross-functional collaboration. In this blog post, we will discuss how a new CIO can engage

Transforming Your CIAM Program: A New CIO’s Guide to Building a Product-Led Team Read More »

abstract close up cobweb connection

The Secret Weapon for Identity Management: How Graph Databases Are Changing the Game

In this article, I’ll discuss the advantages of using graph databases over LDAP for metadata labeling and verification. Verifying identity data, either by using a third-party verification or some internal mechanism, allows you to trust the data you have and use it for potentially higher-risk transactions. That’s where graph databases come in, as they offer

The Secret Weapon for Identity Management: How Graph Databases Are Changing the Game Read More »

a person sitting on the floor with vr goggles using a computer

Wallets in the Digital Age: The Convergence of Identity, Payments, and Decentralized Systems

Introduction The digital landscape has undergone a significant transformation in the way we transact and verify our identities. Digital wallets have facilitated this change by combining the traditional roles of physical wallets and ID cards into a single, convenient digital platform. In this blog post, we will explore the thesis that digital wallets are becoming

Wallets in the Digital Age: The Convergence of Identity, Payments, and Decentralized Systems Read More »

ambulance architecture building business

Securing Sensitive Patient Information with Relationship-Based Access Control (ReBAC) in Neo4j

At a major medical center, managing access to sensitive patient health information is a critical concern. To ensure that patient data is protected, the center has implemented a Relationship-Based Access Control (ReBAC) system using Neo4j, which provides a flexible and granular approach to managing access control. The ReBAC system includes four key roles: doctors, patients,

Securing Sensitive Patient Information with Relationship-Based Access Control (ReBAC) in Neo4j Read More »

close up photo of a stethoscope

The Future of CIAM – Part 4 

How Decentralized identity and Verifiable Credentials potentially improves digital identity onboarding and identity verification What is identity onboarding? Identity onboarding is the process of gathering and verifying an individual’s identity and personal information when they sign up for a service or open an account with an organization. The purpose of identity onboarding is to ensure

The Future of CIAM – Part 4  Read More »

What are the various privacy laws around the world

Privacy laws are legal frameworks that regulate the collection, use, and disclosure of personal information by organizations. The purpose of these laws is to protect individuals’ privacy and personal data from misuse, abuse, or unauthorized access. Privacy laws can take various forms, including federal, state, or local laws, as well as industry-specific regulations. Some of

What are the various privacy laws around the world Read More »

Scroll to Top