Gartner IAM Six Principles of Resilience - The Identity and Access Manag...
Avatier uses the keynote at the Gartner IAM summit to advocate how identity and access management solutions mitigate risks in an era of digi
Cryptography: The Risks of Key Recovery, Key Escrow, and Trusted Third-P...
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption. Hal Abelson , Ross Anderson , Steven M. Bellovin , Josh
How to Implement OAuth2 w/ OpenID Connect & UMA | Gluu | Blog
Learn how to use the OpenID Connect and User Managed Access (UMA) profiles of OAuth2 to centralize client registration and token issuance.
OIDF touts OpenID Connect certification | Gluu | Blog
Gluu provides feedback on the OpenID Connect certification programs, questioning whether the OIDF is serving the OpenID Community or its cor
What in the world is Digital Transformation? « Discovering Identity
Digital: “of, relating to, or using data in the form of numerical digits“. Transformation: “change in form, appearance, nature, or character
Robert Shiller: Unlike 1929 This Time Everything - Stocks, Bonds And Hou...
Q. How else does this period of apparent equity overvaluation compare to equity booms in the past? Robert Shiller: This time around, bonds a
Understanding the different types of BLE Beacons | mbed
Bluetooth Low Energy (BLE) Beacons - there are several types available (URIBeacon, AltBeacon, iBeacon), each with their own standards and ad
Senate creating secret encyclopedia of US spy programs
Associated Press historical news archive articles dating back to 1985