Latest News
News and updates
The latest news from the Yookey world
Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC) compared
[INDEX] Permission Management: How ABAC and RBAC work Fundamental differences between ABAC and RBAC Policy Maintenance:…
IT Wallet and SPID: updates on digital identity
What is the IT Wallet and what is it for? How does the IT Wallet work…
SPID and CIE: differences and integration with Keycloak
INDEX SPID and CIE compared: how Digital Identities work SPID and CIE Security Levels Enabling SPID…
Role-Based Access Control (RBAC): What is it, benefits and best practices
[INDEX] What is Role-Based Access Control (RBAC)? What are the benefits of implementing RBAC? What does…
IAM systems and gamification: secure training through play
[INDEX] What is gamification and why it enhances e-learning for IAM systems Passwords and MFA: phishing…
IAM and Identity Lifecycle: security from Onboarding to Offboarding
What is identity lifecycle management (ILM)? IAM: why it’s essential for enterprise security Digital Onboarding: how…
IAM Systems and Compliance: Ensuring Adherence to NIS2 and ISO 27001
[INDEX] Why NIS2 and ISO 27001 require an advanced IAM System IAM Best Practices for compliance…
Zero Trust and NIS2: advanced protection of digital access and identities
INDEX What is Zero Trust Architecture and what role does it play in cybersecurity? How does…
E-time will participate in Forum PA 2025
E-time will participate in FORUM PA 2025, scheduled from May 19 to 21 at the Palazzo…

