Badges
40 Points
2 Years
User Activity
Over 2 years ago
Answered a question: Twilio discloses a data breach. What could be done better to prevent it in the future?
In case of sophisticated social engineering attack designed to steal employee credentials there is a need to pay attention regarding education of employee first and if not already in place apply Zero Trust approach by implementing OTP and using it as mandatory for all…
Over 2 years ago
Answered a question: How is Zero Trust different from the Least Privileged model?
Zero Trust is the same approach for all users (for example internal and external) - for example, OTP.
The Least Privileged approach defines access rules based on user role. It is common and recommended to combine these two approaches. An attacker has to first break user…
Over 2 years ago
Answered a question: What are your best practices for Identity and Access Management (IAM) in the Cloud?
Identity and access management in the cloud - there are more interpretations of this question - like where are the identities stored (on-premise/in cloud/ both with sync between them already)?
where is the service with managed access located? what is the access based on…
Almost 3 years ago
Contributed a review of EVOLVEUM midPoint: Copes well with evolving environments and it's easy to look after the source code
Reviews
Almost 3 years ago
EVOLVEUM midPoint
Answers
Over 2 years ago
Identity Management (IM)
Over 2 years ago
Identity Management (IM)
Over 2 years ago
Identity Management (IM)