ITDR is dead. Long live ITDR.
The threat landscape has evolved far beyond what a four-letter acronym was ever designed to...
Read More
Select Page
by Evie Kim Sing | Mar 31, 2026
The threat landscape has evolved far beyond what a four-letter acronym was ever designed to...
Read Moreby Evie Kim Sing | Mar 27, 2026
Unifies PAM, EPM, IGA, CIEM, NHI, and AI Agent Security in a single package to protect human,...
Read Moreby Evie Kim Sing | Mar 10, 2026
Guest article by Fletcher Heisler, CEO, Authentik Security As organisations continue to modernise...
Read Moreby Evie Kim Sing | Feb 17, 2026
Jared Atkinson, CTO at SpecterOps For years, defenders have focused on stopping an initial breach....
Read Moreby Evie Kim Sing | Feb 16, 2026
By Christina Hulka, Executive Director, Secure Technology Alliance Identity leaders have spent...
Read Moreby Evie Kim Sing | Dec 15, 2025
Guest article: SGNL A look into the decision-making process that led one of the world’s top...
Read Moreby Evie Kim Sing | Nov 5, 2025
Guest article by Mike Leahy In an era when personal facts fuel markets, governance, and machine...
Read Moreby Evie Kim Sing | Oct 22, 2025
Expert Insight from Petards Rail Britain’s railways are emerging as a prime target for cyber...
Read Moreby Evie Kim Sing | Oct 8, 2025
Guest author: Joni Brennan Features in Letters from the President by DIACC The choices we make...
Read Moreby Evie Kim Sing | Oct 3, 2025
Written by Jack Oliver Compliance & Regulations Writer The internet is about to change in a...
Read Moreby Evie Kim Sing | Sep 1, 2025
By Jarek Sygitowicz, Co-Founder and Chief Strategy Officer at Authologic It has been just a few...
Read Moreby Evie Kim Sing | Aug 29, 2025
The Digital Identity Adoption Crisis: How UDIS Unlocks Universal Access Breaking the barriers...
Read Moreby Evie Kim Sing | Aug 26, 2025
Written by Michael Leahy, Vice President, National IT Strategy, Government Sourcing Solutions The rapid acceleration of digital transformation presents both unprecedented opportunities and profound challenges for governments...
Read Moreby Evie Kim Sing | Jul 29, 2025
Bridging the Gap Between Regulation and Real-World Parenting Guest post: Nino Dvalidze, Founder, Young Minds App Online safety tool for families As a mother, parenting influencer, and founder of a digital safety tool used by...
Read Moreby Evie Kim Sing | Jul 18, 2025
Lakota Software Solutions, already powering FBI and DoD biometric systems with its Ani SDK, is...
Read Moreby Evie Kim Sing | Jun 3, 2025
The UK is rapidly advancing its shift toward digital identity in air travel, with a major rollout of facial recognition technology announced in March 2025 across 14 major airports, including Heathrow, Gatwick, Manchester, and...
Read Moreby Evie Kim Sing | May 21, 2025
Authored by Viky Manaila, co-authored by Chris Tullis Introduction All 27 European Union member states have a deadline of December 2026 to ensure that a European Digital Identity (EUDI) Wallet is available to their citizens....
Read Moreby Evie Kim Sing | May 14, 2025
Birmingham City University’s Deputy Head of the College of Computing and Cybersecurity expert, Dr Junaid Arshad, explains how stolen personal information, including contact details and dates of birth, may increase the risk...
Read Moreby acairnssmp | May 7, 2025
Article contributed by seowala.com Total cryptocurrency adoption worldwide has caused safety alongside transaction legitimacy to emerge as paramount issues. Statista data shows that crypto user verification increased...
Read Moreby Evie Kim Sing | May 6, 2025
Article contributed by Eric Olden, CEO, Strata Identity For enterprise identity and access management (IAM) teams, mergers and acquisitions (M&A) present a familiar challenge: quickly providing new employees access to...
Read More
Subscribe for top news, trends, and exclusive discounts on our events

