SSOCircle

  • Home
    • Service Status
  • Portfolio
    • Public IDP
      • Meta Data
      • X.509 PKI
      • AuthContext Tour
    • White Label IDP
      • Quick Tour IDPee
    • SAML Test
      • SSOCheck Tool
      • SSOCheck API
      • SAML SP Certification
      • SAML Monitor Light
    • OpenAM OS Support
    • IDP-Proxy
    • MyIdentityGraph
    • Authz as a Service
    • Support
    • Consulting/Research
    • Donation
    • Pricing
  • Knowledge Center
    • IDP Tips & Tricks
      • Public IDP How-To
      • Public IDP Data
      • Metadata Editor
      • Debugging IDP
      • SAML with cURL
        • Tutorial: Part I
        • Tutorial: Part II
    • PKI for X.509 Auth
    • SSOCheck Tool
      • Tool Quickstart
      • Sample Script 1
      • Sample Script 2
    • SSOCheck API
      • Test AuthZ API
      • Test Config API
      • Test Execution API
      • Test Rules
      • SAML with cURL
        • Tutorial Part I
        • Tutorial: Part II
    • MyIDGraph Ontology
    • MyIDGraph Manual
      • Quick Start
      • General Usage Options
      • Exploring a Vertex
      • Requesting Permissions
      • Approving and Declining Permission Requests
      • Removing Access Permissions
      • Delegate Permissions to another Person
    • AzaaS ReBAC Manual
      • ReBAC
      • AzaaS Quick Start
    • Debugging Toolbox
      • Session Cookie Decoder
      • Password Encryption
      • Password Decryption
      • SAML Decoder
      • SAML Encoder
    • Service Provider
    • Federation
      • SAML 2.0
      • Glossary
  • Blog
  • About Us
    • Contact
    • Ticket
    • Imprint
  • Sign In / Register
    • Login
    • Logout
    • Global Logout
    • Register

You are here: SSOCircle » Tag: infosecurity

Infosecurity Europe 2014

English on May 6th, 2014 No Comments

Infosecurity Europe 2014 held on 29. April to 1. May in London – the gathering of information security professionals. It is the largest event of this type in Europe. You made it to London and despite the Tube strike during the days of the event you reached Earls Court. On entering the conference center you […]

Tags: infosecurity

RSS Kuppinger & Cole

  • ​​Applying the Identity Fabric for the Finance Industry: Rethinking IAM as a Service Portfolio​
  • Building Control: Enabling Enterprise Ownership of Authorization
  • Will There Be Convergence of NHIs and Secrets Management?
  • Third-Party Access: Securing the Weakest Link in Your Identity Strategy
  • Data Security Platforms

RSS Gartner Blog

RSS Computer Week Security

  • Home Office ‘backdoor’ seeks worldwide access to Apple iCloud users’ data, court documents confirm
  • How to manage Active Directory security
  • AI and backup: How backup products leverage AI
  • UK cyber security centre helps expose China-based cyber campaign
  • What is network security? Definition and best practices
Copyright © SSOCircle | site notice | terms | privacy policy