Jim Morris

 

   



19 Stories by Jim Morris

Best Practices for Operational Technology (OT) Security

Operational Technology (OT) refers to the hardware and software systems that are used to monitor and control physical processes in industries such as manufacturing,...
2 min read

Delinea Acquires Authomize to Detect and Mitigate Identity Threats

In a move to strengthen its capabilities in the field of identity threat detection and mitigation, Delinea has recently announced its acquisition of Authomize,...
1 min read

Rotating Credentials for GitHub.com and New GHES Patches

GitHub.com is a widely used platform for hosting and collaborating on code repositories. With the increasing importance of security in today’s digital landscape, it...
1 min read

How Digital Certificates Help Secure Online Transactions

In today’s digital age, online transactions have become an integral part of our daily lives. From online shopping to banking, we rely on the...
0 1 min read

Is Verifiable Credentials Addressing Deepfake Challenges?

Deepfake technology has become a growing concern in today’s digital age. With the ability to create highly realistic fake videos and images, deepfakes have...
0 2 min read

Best Practices for Selecting an Identity Governance Tool

Identity governance is a critical aspect of modern businesses, ensuring that the right individuals have the appropriate access to resources and data within an...
2 min read

Exploring the Differences Between CIAM and Workforce Identity

When it comes to managing identities and access within an organization, two key concepts often come up: Customer Identity and Access Management (CIAM) and...
0 2 min read

Unveiling Consult Identity: Navigating the Dynamic Landscape of Identity Management

Welcome to Consult Identity, where expertise meets innovation in the ever-evolving world of identity management. As a leading player in the identity industry, Consult...
0 1 min read

Understanding the Difference Between OAuth 2.0 and OIDC

When it comes to securing access to web applications and APIs, two popular protocols come to mind: OAuth 2.0 and OIDC (OpenID Connect). While...
2 min read