A - F
Active Directory

Authentication in cybersecurity refers to verifying the identity of a user, device, or system, ensuring that access to resources is granted only to those who are...

Authentication

Authentication in cybersecurity refers to verifying the identity of a user, device, or system, ensuring that access to resources is granted only to those who are...

Cloud identity

The way we work has fundamentally changed. Applications, data, and users are no longer confined to the traditional office perimeter or on-premise applications. They’re spread across...

Continuous Access Evaluation Protocol (CAEP)

Continuous Access Evaluation Profile (CAEP) is a security protocol (or standard) currently in development. The purpose of CAEP is to address the challenges of traditional access...

Cyber resilience

The concept of cyber resilience is about an organization’s ability to prepare for, respond to, and recover from cyber attacks or other disruptions affecting its digital...

Cybersecurity compliance

Cybersecurity compliance refers to an organization’s adherence to established laws, regulations, standards, and guidelines that are created to protect sensitive data and systems from cyber threats....

G - L
Identity and Access Management (IAM)

Identity and Access Management (IAM) is a framework that helps organizations achieve two critical objectives: manage digital identities and control access to resources. It ensures that...

Identity Provider (IDP/IdP)

An identity provider (IDP) is a trusted system that manages and verifies user identities. Think of it as a digital passport office. It issues and manages...

Identity security

Identity security is about securely managing digital identities throughout their lifecycle. Key components of identity security include protecting user credentials, managing access rights, monitoring activity, and...

Legacy IDP

Legacy identity systems refer to older, traditional, and outdated identity and access management (IAM) infrastructures.  Organizations have used them for decades to manage user authentication, authorization,...

M - R
NIST Cybersecurity Framework (CSF)

To help organizations manage and mitigate cybersecurity risks, the National Institute of Standards and Technology (NIST) developed the Cybersecurity Framework (CSF), a valuable and flexible set...

S - Z

Sorry, nothing to display.

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z
of 11 entries