Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Categories
T&I Consultancy Trust, Identity and Access Blogs UK Access Management Federation

Cyber Essentials: why keeping your Shibboleth IdP up to date is crucial

A core aspect of Cyber Essentials is keeping your systems up to date. This is true both for operating systems and any installed apps or software, and these must always be kept updated.   Applying these updates is one of the most important things you can do to improve security. It ensures that devices and software are not vulnerable to known […]

Categories
Trust, Identity and Access Blogs UK Access Management Federation

I’m not a number, I’m a pseudonymous identifier…

“Are THEY listening to us?” “Who’s they?” “You know, the phones, the laptops?” And so goes the conversation that I sometimes have with my wife. Perhaps after we’ve had a chat about hiking poles, when every ad on our social media feed then shows hiking poles, despite neither of us having directly Googled them. (Although […]

Categories
Trust, Identity and Access Blogs

Trust no one; the bad guys are coming down the pipes!

This year’s KuppingerCole European Identity and Cloud conference saw several talks about Zero Trust Models and Passwordless Authentication. No longer in cyber security is it enough to lock your front door and all of your windows, now the bad guys are ‘coming down the pipes’! To use X-Files parlance ‘Trust no one’ — not even […]

Categories
Domain Registry Trust, Identity and Access Blogs

Manage domains for your organisation? Here’s what you need to know about the upcoming changes to key Jisc Services

Welcome to this joint broadcast from Jisc‘s Trust and Identity and Security Services teams! What’s the score? In the new year, we will be changing the way you access the following services, making it easier for you to manage your existing subscriptions: Domain registry service (DRS) Primary nameserver service (PNS) We’re adding these services to the new […]