October 28, 2025 Blog, NewsletterIs Policy-Based Access Control (PBAC) an Authorization Model?If you’ve spent any time designing secure systems, you’ve explored the wonderful world of authorization acronyms: RBAC, ABAC, ReBAC, and… […] Read more
October 28, 2025 Blog, NewsletterIGA Connectors: The Bridge Between Policy and ExecutionAn Identity Governance and Administration (IGA) platform serves as the central authority for defining and enforcing access policies. However, its […] Read more
October 28, 2025 Blog, NewsletterUnderstanding Non-Human Identities (NHI) part 1: general overviewThe concept of Non-Human Identities (NHIs) has become a defining topic in Identity and Access Management (IAM). This article introduces […] Read more