The Second Golden Age of Identity
We are now in the second golden age of identity and access management (IAM). Mobile devices, cloud computing, social networks, Big Data, and the Internet of Things (IoT) require radically improved capabilities. They are driving rapid innovation in IAM standards, technology, and architecture. In the face of cybercrime and cyber-conflict, post-modern IAM must also address … Continue reading The Second Golden Age of Identity
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed