History of Identity Management Infographic

Idramp presents the future history of identity and access management. History of Identity and Access Management (text version) 1853 First Birth Certificates – Compulsory registration of births within the United Kingdom government originated as far back as 1853....

Electric Utilities Identity Management

Identity and access management design The National Cybersecurity Center of Excellence (NCCoE) has published an example solution architecture guide that electric utilities and enterprises can use to more securely and efficiently manage access to the networked devices...

68% of data breaches take months or longer to discover

Data Breach Investigations The eleventh annual Verizon Data Breach Investigations Report (DBIR) provides valuable insight for the Identity and Access Management community.  The research is based on analysis of over 50,000 real-world incidents, and over 2000 confirmed...

Mobile Blockchain Identity Management

Mobile Authentication Taskforce The evolution of blockchain is transforming every aspect of cyber security including mobile identity and access management.  AT&T, Sprint, T-Mobile and Verizon formed the Mobile Authentication Taskforce last year to protect...

Decentralized Identity Strategy

The Problem? Enterprises are recognizing that a centralized identity model is difficult to sustain. The number of digital identities and types of application relationships grow faster than what the enterprise can adequately respond to. The Solution = Decentralized...