It’s time to create a #DigitalTwin Instance of a physical entity that is derived from a Digital Twin Model.
Authentication
It’s Time to Dump your 1990s App Authentication
Migrate Win32 applications secured by client/server database logins to #mobile apps that use OAuth & enterprise cloud directories for authentication instead.
12 Steps to Stop the Next IoT Attack in its Tracks
The recent distributed denial-of-service (DDoS) #IoT attack against DNS is a wake up call to how fragile the Internet can be.
Improve Employee Productivity at your Company by Implementing a Hybrid Identity Strategy
Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any #mobile device on any network.