
Ubisecure
@ubisecure
Followers
7K
Following
4K
Media
2K
Statuses
11K
Customer & Org Identity Management #IDaaS. Accredited issuer of Legal Entity Identifiers (#LEI). Home of the "Let's Talk About Digital Identity" Podcast #LTADI.
United Kingdom & Finland
Joined September 2016
Is now the right time to invest into Identity and Access Management (IAM)? Join @osantolalla as he explores why now is the right time to invest into #IAM with Jesse Kurtto, DPO and Data Scientist at Ubisecure ๐ง๐#LTADI #DigitalIdentity
0
0
1
The FATF & LEI Series: Understanding FATF Recommendation 16: what Compliance Teams need to know
rapidlei.com
FATFโs Recommendation 16, known as the Travel Rule, is a critical piece of the international anti-money laundering guidance. It mandates that originator and
0
0
0
RT @GLEIF: Want trusted digital finance? @CambridgeAltFinโs new report highlights why #DPI matters & how LEIs can address identity gaps inโฆ.
0
1
0
RT @GLEIF: GLEIF announces that @BNPParibas joins the Global LEI System as a Validation Agent, becoming the 1st G-SIB in the #EU to do so!โฆ.
0
1
0
The IAM landscape is experiencing profound change thanks to the advent of #biometrics. Learn about the latest advantages and key benefits of biometrics in identity
computerweekly.com
The IAM landscape is experiencing profound change thanks to the advent of biometrics. Learn about the latest advantages and key benefits of biometrics in identity.
0
0
0
๐ ๐ Congrats to @AnnCavoukian for getting Privacy by Design over the line as an ISO standard๐๏ธ @osantolalla shares this storytelling episode reminding us what the 7 principles of #PrivacyByDesign are โก๏ธ #IAM #DigitalIdentity #LTADI.
ubisecure.com
Ann Cavoukian and Katryna Dow join #LTADI podcast to explore the importance of Privacy by Design and the road to becoming ISO Standard 31700.
0
1
3
Work in #healthcare? ๐ ๐ This blog will explore the shift towards digitalisation in healthcare and why hybrid cloud storage is an effective and compliant option๐ ๐ #HybridIAM #IAM #eHealthcare.
ubisecure.com
Find out why hybrid cloud data storage has become a popular solution in supporting e-healthcare in the shift towards digitalisation.
0
0
0
Data is at the very heart of the LEI, with each individual LEI record containing registered and verified reference data for its corresponding entity. Stephan provides an overview of this data in this latest @gleif explains video
0
0
0
KERI key management infrastructure is the protocol on which the verifiable Legal Entity Identifier is built. Learn how it works from Principal Scientist at Ubisecure, Petteri Stenius ๐ #DigitalIdentity #IAM #Authentication #KERI.
ubisecure.com
Looking to understand how vLEI uses KERI Architecture? This blog focuses on the use of KERI within vLEI, read to find out more.
0
0
0
๐๏ธ ๐กIdentity Governance and Administration is the internal access and rights within a business and who better than Craig Ramsey, Senior Solutions Architect at @OmadaIdentity to talk with @osantolalla on #LTADI about this topic ๐ #IGA #IAM #IDaaS
0
1
0
๐2023 has seen an increasing awareness of the need to verify identity statements and correspondingly, the increasing maturity of verifiable credentials is providing a framework to that end says @sdwood in his 2023 end of year review ๐ #DigitalIdentity.
0
0
0
In this @helpnetsecurity interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have a playbook that clearly outlines what to do
helpnetsecurity.com
The ransomware negotiation dynamics very much depend on the plan organization has in place as part of its incident response strategy.
0
0
0
In this via @helpnetsecurity video, Peter Manev, Chief Strategy Officer at Stamus Networks, discusses a pervasive problem plaguing security analysts called โalert fatigue,โ
helpnetsecurity.com
Peter Manev addresses "alert fatigue" in security analystsโdesensitization to alerts leads to missed critical events and delays in response.
0
0
0
Email security remained top of mind for #cybersecurity professionals in 2023 as over nine in ten (94%) cyber decision-makers had to deal with a #phishing attack, according to email security provider Egress.
infosecurity-magazine.com
In its latest Email Security Risk Report, Egress found that businesses were 10% more negatively affected by phishing attacks in 2023 than in 2022
0
0
0
In this @HelpNetSecurity interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have a playbook that clearly outlines what to do
helpnetsecurity.com
The ransomware negotiation dynamics very much depend on the plan organization has in place as part of its incident response strategy.
0
0
0
๐ ๐ก What are verifiable credentials? @rileyphughes of @trinsic_id joins @osantolalla to explore this topic in our most recent episode of #LTADI ๐ #DigitalIdentity #VerifiableCredentials #IAM.
ubisecure.com
Riley Hughes, host of The Future of Identity Podcast, joins Oscar to explore the role of verifiable credentials within digital identity.
0
0
1
๐ก "An identity platform is not a Zero Trust solution, it is part of a Zero Trust infrastructure โ a critical part, but still a part." from our CEO, @sdwood ๐ Full blog: #ZeroTrust.
ubisecure.com
Exploring the Zero Trust concept and why identity and access management is a crucial tool for this infrastructure.
0
0
0
Understanding #IAM is crucial for professionals across companies, not only for the IT folks as it used to be in the beginning of the century says @osantolalla in #LTADI ๐ New places available for IAM Academy in Spring!.
ubisecure.com
Oscar discusses Ubisecure's free training on Identity and Access Management and our Identity Platform for our partners and customers.
0
0
0
Data spaces are urged to grasp an understanding of implications of the amended eIDAS regulation and expansion of trust services. via @IdentityWeek_ID.
identityweek.net
Data spaces are urged to grasp an understanding of implications of the amended eIDAS regulation and expansion of trust services. The digital identity landscape is important to data space development...
0
0
0