identity ideas
How to cope with digital identities
vrijdag 12 juni 2020
Internet voting
›
Gene Spafford is one of my old security heroes. As you may know, not having an ICT background I'm not an expert in technical IT security...
woensdag 22 mei 2019
Password non-compliancy
›
Google reported that for 14 years passwords for G Suite have been stored in a less than secure way : " We made an error when implementi...
woensdag 7 december 2016
Ransomware incident analysis
›
- Lets start with a disclaimer... I wrote this post a while back, but forgot to publish it, sorry...- Ransomware encrypted all of the New...
Parts 3 and 4 of the blog series from RBAC to ABAC
›
This year I joined the new Dutch subsidiary of Nixu Oyj, the Finnish cybersecurity company, as a security and IAM consultant. Nixu employs o...
maandag 12 september 2016
Migrating from RBAC to ABAC, part 2: Access control fundamentals
›
Down with the role! That's actually been my motto for quite a while. But getting rid of the role cannot be done overnight. Especi...
zondag 28 augustus 2016
Migrating from RBAC to ABAC (Part 1)
›
A long time ago I wrote the following statement on my LinkedIn profile: "RBAC is EOL". And in my not so youthful overconfiden...
›
Homepage
Internetversie tonen