Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Digital Identity

The Build vs Buy Conundrum: Identity, Access, and Identity Federation Solutions

Managing user identities and access controls is a critical challenge for modern businesses. With remote work, cloud computing, and stringent data privacy regulations, organizations need robust identity and access management (IAM) solutions to ensure secure access to their applications and data. However, when it comes to implementing IAM, companies often face a choice: build a custom solution in-house or buy a third-party product.

Shaping the future of work with Tech1M

Welcome to 'Personally,' Persona’s podcast, where we bring you closer to the personal stories behind some of the most innovative and inspiring entrepreneurs of our time. Joining us is Tommie Edwards, the Founder and Chief Executive of Tech1M. Tommie's journey is a remarkable tale of passion, innovation, and leadership. Tommie has been recognized as one of the Top 100 Most Influential Leaders in Tech in the UK by the Financial Times and Inclusive Boards.

How to Align Your Security Strategy with NIST Cybersecurity Framework 2.0

After a decade in the making – or waiting, as the case may be – the National Institute of Standards and Technology (NIST) has released the first major revision to its Cybersecurity Framework (CSF), a set of voluntary standards and best practices for managing cybersecurity risks. NIST CSF 2.0, released on Feb 26, 2024, expands the scope and applicability of the framework to cover more types of organizations and industries, including the private sector, government and nonprofits.

Why Identity Security Is Essential to Cybersecurity Strategy

In the modern digital landscape, cybersecurity isn’t just a technical challenge – it’s a business imperative. At the heart of cybersecurity is identity security – the principle that the right people have the right access at the right time. As we venture further into the digital world, protecting the business from modern threats is crucial, which inherently adds complexity, making smart privilege controls a must-have step toward an identity-first strategy.

The Role of Document Assessment and Data Extraction in Modern ID Verification

In the modern digital landscape, the importance of document assessment and data extraction in ID verification processes cannot be overstated. These technologies are pivotal for businesses and organizations to ensure security, compliance, and efficient customer onboarding. With the rapid digitalization of services, from neobanks to telehealth, efficient and secure digital customer acquisition has become crucial.

Pioneering peer-to-peer boat sharing with GetMyBoat - Personally S02E01

Dive into the world of fintech with "Personally" by Persona, where we explore the innovative solutions driving today's startups. In this episode, Ed Giansante chats with Bryan Petro is the Chief Operating Officer (COO) of GetMyBoat, the world's largest boat rental & charter marketplace with over 150,000+ boats in 9,300 locations and 184 countries. He was the first employee at GetMyBoat starting in Product Management and Operations, having managed the Company's explosive growth into a globally distributed company across 8 countries (employees).

EP 47 - Digital Trust and the Identity Cornerstone

In this episode of Trust Issues, Jan Vanhaecht, the Global Digital Identity Leader at Deloitte, Belgium, delves into the intricate realms of digital trust and risk management with host David Puner. The discussion covers topics ranging from the impact of regulations on cybersecurity practices to the pivotal role of identity in building a robust security culture.

Why Your Organization Needs Dynamic Secrets and Rotation

In today’s rapidly evolving digital landscape, organizations confront a formidable array of cyber threats, with attacks and data breaches becoming increasingly prevalent. As businesses embrace transformative technologies such as AI, automation, cloud-native architectures, microservices and containerization, the proliferation of machine identities has surged, often surpassing human identities.