RAJIV DEWAN - CYBERSECURITY IAM PROFESSIONAL

A Cybersecurity Identity & Access Management (IAM) professional, specializing in scalable, cutting-edge IAM solutions for large organizations across the globe. Over the years, I’ve played various roles, focusing on areas such IGA, SSO, MFA, PAM, Directory Services, and Password Vaults. I invite you to explore my content, where I share insights and best practices from my IAM and Cybersecurity journey

Future of Identity and Access Management (IAM)

›
Full Paper Link :  Click Here I have been working in the Identity and Access Management field for about 18 years, and I can tell you that IA...

Security Principles: Just In Time Access and Zero Standing Privileges

›
JIT : Just-In-Time Access ZSP : Zero Standing Privileges If you work in Cybersecurity IAM Domain, you may be familiar with terms Just-In-Tim...

User Access Review (UAR) – A Closer Look at the Process and Its Challenges

›
What is User Access Review (UAR)? User Access Review (UAR) is a process to review users' accesses/permissions and take the corrective ac...

Cybersecurity World: Security vs User Experience

›
I want to ask this question to all the security professionals, What is more important between security and user experience ? I have been...

Authention App for 2FA - TOTP

›
Nowadays using authentication mobile apps for 2FA is very common. I was always wondered how does it work in the background. How mobile app g...
›
Home
View web version
Powered by Blogger.