Latest News
News and updates
The latest news from the Yookey world
SPID and CIE: differences and integration with Keycloak
INDEX SPID and CIE compared: how Digital Identities work SPID and CIE Security Levels Enabling SPID…
Role-Based Access Control (RBAC): What is it, benefits and best practices
[INDEX] What is Role-Based Access Control (RBAC)? What are the benefits of implementing RBAC? What does…
IAM systems and gamification: secure training through play
[INDEX] What is gamification and why it enhances e-learning for IAM systems Passwords and MFA: phishing…
IAM and Identity Lifecycle: security from Onboarding to Offboarding
What is identity lifecycle management (ILM)? IAM: why it’s essential for enterprise security Digital Onboarding: how…
IAM Systems and Compliance: Ensuring Adherence to NIS2 and ISO 27001
[INDEX] Why NIS2 and ISO 27001 require an advanced IAM System IAM Best Practices for compliance…
Zero Trust and NIS2: advanced protection of digital access and identities
INDEX What is Zero Trust Architecture and what role does it play in cybersecurity? How does…
E-time will participate in Forum PA 2025
E-time will participate in FORUM PA 2025, scheduled from May 19 to 21 at the Palazzo…
How IAM solutions strengthen healthcare security
The Impact of IAM Solutions on security in the Healthcare Sector The benefits of implementing an…
The Identity and Access Management Tools for the Education Sector
[INDEX] IAM Systems for the Education Sector The Role of IAM in the Education Sector Why…