Kevin Wen

 

   



13 Stories by Kevin Wen

Risk-Based Authentication: A Modern Approach

In today’s digital landscape, where cyber threats are constantly evolving, traditional methods of authentication are no longer sufficient to protect sensitive information. As a...
3 min read

Understanding the Identity Fabric: A Key Element in Modern Security Architecture

In today’s digital landscape, security is of utmost importance. With the increasing number of cyber threats and data breaches, organizations need to have robust...
3 min read

Delinea to Acquire Fastpath to Revolutionize Privileged Access and Identity Governance

Delinea, a leading provider of cybersecurity solutions, has announced its plans to acquire Fastpath, a renowned company specializing in privileged access and identity governance....
1 min read

What Is Web3 Identity and Key Pillars of Web3 Identity?

In the digital age, where our lives are increasingly intertwined with the online world, the concept of identity has taken on a new dimension....
0 2 min read

Best Practices for Application Onboarding Automation Process

Introduction Application onboarding is a crucial process for organizations that want to streamline the integration of new applications into their existing systems. Automating this...
1 min read

Understanding the Difference Between Operational Technology and Information Technology Security

In today’s digital age, the security of both operational technology (OT) and information technology (IT) has become increasingly important. While the two terms may...
0 2 min read

Breaking Down Complex Authorization Beyond Login

When it comes to building secure web applications, one of the most crucial aspects is authorization. While most developers are familiar with the concept...
0 2 min read

Best Practices for Selecting a Customer Identity and Access Management (CIAM) System

Customer Identity and Access Management (CIAM) systems play a crucial role in managing and securing customer data, providing personalized experiences, and ensuring regulatory compliance....
2 min read

Best Practices for Selecting an Enterprise Identity and Access Management (EIAM) System

Enterprise Identity and Access Management (EIAM) systems play a crucial role in securing an organization’s digital assets and managing user access. With the increasing...
2 min read

Best Practices for Selecting an Access Management Tool

Access management is a critical aspect of any organization’s security infrastructure. With the increasing number of cyber threats and the need to protect sensitive...
2 min read