How To Launch A Digital Product

Invalid Date

Well-executed launches can create considerable tailwinds behind a digital product. However, along with the excitement of the upcoming product launch comes an overwhelming list of tasks.


Understanding the Different 2 Factor Authentication Types

Invalid Date

Today, activating 2FA or two-factor authentication is paramount to securing your online services. Today, almost every site that requires a log on process urges its users to enable 2FA.


Bringing CIAM into the serverless world with Auth0 and Okta | Wed 4 May | 5.30pm - 6.45pm CEST

April 14th, 2022

Experiences, observations and insights from a leading Identity consultancy, introduced over a whisky tasting. 


Okta Workflows For Customer Identity (CIAM)

December 1st, 2021

A customer identity is a profile of a customer which includes several features. Examples of these items are name, email address, physical address, or payment details.


What Is The Product Development Life Cycle?

November 23rd, 2021

The product life cycle refers to all the phases that contribute to a commercial digital product's design, usage, replacement, or upgrade. 


What Is A Product Development Strategy?

November 22nd, 2021

It’s a process to bring any great digital product to market, from concept creation to building a prototype, testing feedback, and crafting your marketing approach.


Identity and Access Management Implementation Plans

October 14th, 2021

Identity and access management (IAM) is the set of business processes and supporting technologies that allow you to create, maintain, and use a digital identity. The effect of IAM on your organization’s user community, application portfolio, and information resources can be quite profound.


Why OAuth Is Better Than Basic Authentication

October 12th, 2021

A lot is said about OAuth 2.0—some positive, others negative. All the same, it is important to ensure the security of your Application Programming Interface (API)


What Is the Difference Between LDAP and Active Directory?

October 10th, 2021

The two most common tools for setting up IT systems are Active Directory and Lightweight Directory Access Protocol (LDAP). It is important to know what these components are and how they affect your system.


What Is a Privileged User Account?

October 8th, 2021

Cyber attacks have become very common on privileged accounts, primarily because they represent the gateway to a company’s most valuable data. 


MFA Requirements for PCI Compliance

October 6th, 2021

Cyber attacks continue to access private networks and steal sensitive information from individuals and organizations using valid credentials. 


MFA Implementation Best Practices

October 4th, 2021

Recent studies reveal that poor credential security is one of the main causes of data security breaches, with 81 percent of these breaches caused by weak or lost passwords