What Is Identity Governance and Administration?

Identity governance and administration (IGA) is a policy-based approach to identity management and access control. As the name implies, IGA systems merge identity governance and identity administration to provide additional functionality beyond traditional identity and access management (IAM) tools. Particularly, they offer valuable support in…

What Is Vishing?

Vishing (or “voice phishing”) is a type of social engineering scam where an attacker tries to trick their target into surrendering sensitive data over the phone.  As with other social engineering attacks, these phone phishing scams prey upon human emotions—attackers often create false scenarios that cause panic (e.g., security alerts) or desire (e…

FREE NOW: Making remote work simple and secure for 1,300 employees with Okta

Can you think of a moment before 2020 when the words “in these unprecedented times” have been more widely used? Organisations all over the world are pushing their creativity to the limit to keep “business as usual” under very unusual circumstances. The coronavirus situation has impacted companies of every size, including FREE NOW, the multiservice…

What Is an API?

API is an acronym that stands for “application programming interface,” and it allows apps to send information between each other. While there are numerous protocols and technologies involved, the underlying purpose of APIs is always the same: to let one piece of software communicate with another.  APIs (sometimes described as web services) work in…

What Is Attribute-Based Access Control (ABAC)?

Attribute-based access control (ABAC) is an authorisation model that evaluates attributes (or characteristics), rather than roles, to determine access. The purpose of ABAC is to protect objects such as data, network devices, and IT resources from unauthorised users and actions—those that don’t have “approved” characteristics as defined by an…

Magic Links: Passwordless Login for Your Users

Magic links are a form of passwordless login. Instead of the user entering any login credentials to sign in, they are sent a URL with an embedded token via email, and sometimes via SMS. Once the user clicks that link to authenticate, they are redirected back to the application or system having successfully signed in—as if they used a “magic”…

What Is Best-of-Breed Technology?

“Best-of-breed technology” refers to the leading applications, systems, or software in a niche or category.  When organisations take a best-of-breed (or “best-in-breed technology”) approach to building their technology stack, it involves selecting various tools that serve specific purposes. Put another way, instead of purchasing a product suite…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube