Ubisecure(@ubisecure) 's Twitter Profileg
Ubisecure

@ubisecure

Customer & Org Identity Management #IDaaS. Accredited issuer of Legal Entity Identifiers (#LEI). Home of the "Let's Talk About Digital Identity" Podcast #LTADI.

ID:781578254108991488

linkhttps://www.ubisecure.com/lets-talk-about-digital-identity-podcast/ calendar_today29-09-2016 19:35:51

11,2K Tweets

7,7K Followers

4,3K Following

Ubisecure(@ubisecure) 's Twitter Profile Photo

The IAM landscape is experiencing profound change thanks to the advent of . Learn about the latest advantages and key benefits of biometrics in identity computerweekly.com/feature/Biometโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

๐Ÿ‘ค 'Digital Identity is central to how we trust each other. It's how we trust who to do business with...' ๐Ÿ“ฝ๏ธ This 2 minute video from Ubisecure explains how we are moving ahead to realise its vision for the future of Digital Identity. ๐Ÿ‘€ Watch now ๐Ÿ‘‰ youtube.com/watch?v=h695Krโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

๐ŸŽ‰ ๐Ÿ‘ Congrats to Ann Cavoukian, Ph.D. for getting Privacy by Design over the line as an ISO standard๐ŸŽ™๏ธ Oscar Santolalla ๐Ÿ‡ต๐Ÿ‡ช ๐Ÿ‡ซ๐Ÿ‡ฎ shares this storytelling episode reminding us what the 7 principles of are โžก๏ธ ubisecure.com/podcast/privacโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

Work in ? ๐Ÿ’Š ๐Ÿš‘ This blog will explore the shift towards digitalisation in healthcare and why hybrid cloud storage is an effective and compliant option๐Ÿ‘‰ ๐Ÿ‘‰ ubisecure.com/identity-platfโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

Data is at the very heart of the LEI, with each individual LEI record containing registered and verified reference data for its corresponding entity. Stephan provides an overview of this data in this latest @gleif explains video youtube.com/watch?v=PzE1rSโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

KERI key management infrastructure is the protocol on which the verifiable Legal Entity Identifier is built. Learn how it works from Principal Scientist at Ubisecure, Petteri Stenius ๐Ÿ‘‰ ubisecure.com/legal-entity-iโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

๐ŸŽ™๏ธ ๐Ÿ’กIdentity Governance and Administration is the internal access and rights within a business and who better than Craig Ramsey, Senior Solutions Architect at Omada to talk with Oscar Santolalla ๐Ÿ‡ต๐Ÿ‡ช ๐Ÿ‡ซ๐Ÿ‡ฎ on about this topic ๐Ÿ‘‰ ubisecure.com/podcast/importโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

๐ŸŽ‡2023 has seen an increasing awareness of the need to verify identity statements and correspondingly, the increasing maturity of verifiable credentials is providing a framework to that end says Simon Wood in his 2023 end of year review ๐Ÿ‘‰ ubisecure.com/corporate/2023โ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

In this Help Net Security interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have a playbook that clearly outlines what to do helpnetsecurity.com/2024/01/18/timโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

In this via Help Net Security video, Peter Manev, Chief Strategy Officer at Stamus Networks, discusses a pervasive problem plaguing security analysts called โ€œalert fatigue,โ€ helpnetsecurity.com/2024/01/17/secโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

Email security remained top of mind for professionals in 2023 as over nine in ten (94%) cyber decision-makers had to deal with a attack, according to email security provider Egress. infosecurity-magazine.com/news/94-firms-โ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

In this @HelpNetSecurity interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have a playbook that clearly outlines what to do helpnetsecurity.com/2024/01/18/timโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

Learn why European businesses are choosing Ubisecure as their Identity Platform ๐Ÿ‘‰ ubisecure.com/wp-content/uplโ€ฆ

Learn why European businesses are choosing Ubisecure as their Identity Platform ๐Ÿ‘‰ ubisecure.com/wp-content/uplโ€ฆ #IDaaS
account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

๐Ÿ’ก 'An identity platform is not a Zero Trust solution, it is part of a Zero Trust infrastructure โ€“ a critical part, but still a part.' from our CEO, Simon Wood ๐Ÿ”— Full blog: ubisecure.com/security/zero-โ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

Understanding is crucial for professionals across companies, not only for the IT folks as it used to be in the beginning of the century says Oscar Santolalla ๐Ÿ‡ต๐Ÿ‡ช ๐Ÿ‡ซ๐Ÿ‡ฎ in ๐Ÿ‘‰ ubisecure.com/podcast/iam-acโ€ฆ New places available for IAM Academy in Spring!

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

Data spaces are urged to grasp an understanding of implications of the amended eIDAS regulation and expansion of trust services. identityweek.net/what-can-the-eโ€ฆ via Identity Week

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

Our VP of Customer Success, Keith Uber looks at the tough question of when you should choose over on premise ๐Ÿ‘‰ youtu.be/W8sc5kmyumo

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

๐Ÿ“„The basic concept is that โ€“ instead of using a user ID and password to sign into an eService, I identify myself by scanning my identity document and taking a ๐Ÿคณselfie or a video clip to prove who I am ๐Ÿ‘‰ ubisecure.com/authenticationโ€ฆ

account_circle
Ubisecure(@ubisecure) 's Twitter Profile Photo

โ“ How do two merging companies continue to provide their digital services without friction to the customer? ๐Ÿ“ฝ๏ธ Keith Uber VP of Customer Success at Ubisecure explains. ๐Ÿ‘‰ ๐Ÿ‘‰ bit.ly/2OHAO4d

account_circle