Independent. Dynamic. Involved.
nlen
  1. Insider Risk and Outsider Risk: Features and Actions (2)

    Outsider Risk Traxion
    By Thom Otten and Ewout Vermeulen   While there used to be some kind of watershed between internal infrastructures and the outside world, since the rise of the internet - and more recently working from home - the traditional perimeter is a thing of the past. Data, applications, and users are in a diffuse world where data and applications are accessed sometimes within the traditional...
  2. Insider Risk and Outsider Risk: Features and Actions (1)

    By Ewout Vermeulen and Thom Otten   In the current era of ‘anytime, anywhere and any device there is no longer a traditional perimeter or digital wall that shields the internal organization from the outside world. This also has consequences for the security policy with regard to insider risk and outsider risk. Previously there was a clearer distinction and an organization could take...
  3. The benefits of BizDevOps in an IAM process

    BizDevOps Traxion
    By Stefan Smulders   Just like any other IT project, an Identity Access Management (IAM) project requires the right preparation. In addition, a BizDevOps approach offers an organization a good basis for making an IAM project a success. A successful project journey is important, because a robust IAM...
  4. PAM and IGA: a solid duo to secure your data

    By Alex Heijdenrijk.   Hackers and other cyber criminals are always on the move. They are continuously improving their methods and techniques to breach security perimeters, giving them access to highly sensitive and lucrative information. Every year we see an increase in security incidents, involving stolen credentials. More than ever, cybercriminals are trying to gain credentials...
  5. The right change management is crucial in every IAM project

    By Jeroen Remie.   An Identity & Access Management (IAM) project rarely or never involves a greenfield situation. Every organization already works with access management in one way or another. As soon as there is reason to change or innovate, this means an organization intervenes in an existing situation. Change management, in...
  6. The 10 most common pitfalls for SCIM 2.0 compliant API implementations

    business man looking at pitfalls
    By Paul van Gool. More and more organizations that have implemented Identity Governance and Administration (IGA) solutions choose to maintain user and authorization data in business applications using all kinds of integration methods. In the field I see a lot of different methods of integrations that do not use any standards. In most cases developers need to build custom API’s and/or...
  7. Responsible for your perfect Monday: ROCA and KRACK

    ROCA
    By Traxion Threat Management Team, Jan Koot and Thom Otten Monday October 16th 2017 was an eventful day for crypto and security in general. The world was informed about two huge problems in technology we use daily. It was bad enough that it caused quite some commotion and uproar in the tech world. WPA2 was declared insecure due to the KRACK...
  8. Security Warning: Users pressing the snooze button on security warnings

    security-user-shield
    By Diederik Perk. It’s a puzzle that’s never fully finished: how to close the gap between the security policy and its acceptance by a targeted group of users. Setting the policy rules is one thing, to have members of the organization comply is a different ballgame. A recent NIST study uncovered that the majority of users experience security fatigue. This confirms previous...
  9. Blockchain, the next authentication provider?

    By Robin Gaal.  We all heard about the bitcoin, a cryptocurrency which enables people to anonymously perform secure payments. In the heart of the bitcoin is the blockchain; a decentralized database which records all transactions since the beginning of the bitcoin. The integrity of it is continuously being verified by the entire network as opposed to a central...
Confidental Infomation