Blockchain Use-Cases for IAM

Identity and Access Management (IAM) is core to many enterprise architectures. Centralizing the authentication is mandatory once you have more than a few systems, and IAM providers fill that requirement…

Privacy by Design in Practice

 The past year saw the acceleration of two already important information security trends: the ever-increasing threat of data breaches  a rising consumer and regulatory oversight on corporate data processing. Indeed,…