Search results
Data is power. Still, most people tend to think that it’s the IT department that needs to handle the company’s personal data. The truth is that modern-day digital identity management has very little to do with IT and everything to do with good governance.
Nixu Corporation, Press release, September 24, 2019 at 8:05 AM EEST
I’m an information and IT security consultant with ten years of proven track record in the field of defense contracting. I joined Nixu in Sweden last fall and I figured I’d share my experience as my first anniversary at Nixu has come to pass.
Companies have policy guidelines, policies, and protocols., but what really rules is the culture. Culture isn’t just something that happens, culture is created. That’s why we created One Nixu Playbook.
To thank our wonderful followers, here's a treat: free social engineering playing cards! Print out the Nixu hACKME playing cards, read these tips from the game creator Victor Sant'Anna, and start playing!
Aleksandr Värä attended HI Tech & Industry Scandinavia fair in Herning, Denmark. Here’s what he learned from meeting different tech and industrial people.
Nixu Corporation
Company release, February 16, 2017 at 8:30 a.m.
UNOFFICIAL TRANSLATION, Nixu Corporation Financial statements release for January 1 – December 31, 2016 (Audited)
Digitalization changes industries and businesses around the world. People are starting to realize the growing issues related to personal data management. Consultants offer IAM roadmaps to a broad scope of organizations. What are IAM roadmaps really about and why do business owners turn to them?
Everyone is talking about digital identities, and terms like IAM, PAM, and SSO swirl and twirl around digital services. Getting confused? Are you missing out on the latest insights? Here’s a quick vocabulary to get on top of the DI conversations.
Nixu Corporation
Press release, October 9, 2019 at 1 PM EEST
IT security essentially reduces information related risk to an acceptable ratio of risk to cost. For this reason, the process begins with an extensive risk assessment – a tried and tested process that can be improved. I am inspired by the work of Douglas Hubbard on this topic. Here’s why - part IV a sample case comparing traditional risk analysis with quantitative risk analysis.
Nixu Corporation, Press release on October 15, 2019 at 9:05 AM EEST
In the future, seamless travel technology will enable people to transfer from their home to the destination without showing any ID or travel documents. New initiative aims to tackle the obstacles of trust by a co-operation within authorities and businesses.
Nixu Corporation
Press release on October 18, 2019 at 9 AM EEST
Nixu Corporation
Press release, 28 September, 2016 at 8:00 AM EET
This blog details a common oversight in MFA enforcement regarding federation implementations where MFA is invoked and required in the 3rd party IDP only. This oversight becomes effective when several by- design features, and implementation decisions align in a ”wrong” way.
One of the newest standards in the ISO 27k series is ISO 27701, which addresses security techniques for privacy information management. ISO 27701 offers a certification opportunity that cannot be missed for organisations that already align with ISO 27001 and have completed a GDPR (General Data Protection Regulation) compliance project.
Pure play cybersecurity provider opens second regional office at The Hague Security Delta.