Happy Halloween From Evolveum

Identity management and identity governance might feel straightforward – until things go terribly wrong. This Halloween, we’re sharing five bone-chilling tales that IT teams everywhere can relate to. From ghosts in the system to a zombie outbreak of lingering access permissions, these stories reveal just how quickly things can spiral when situations take a dark Read more about Happy Halloween From Evolveum[…]

Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary

We organized another webinar from the MidPoint Integrations: Partner Series, featuring our partner Atricore and Wazuh! Atricore’s CTO Sebastián Gonzalez Oyuela, their CEO Gianluca Brigandi, and Wazuh’s IT Security Engineer Gerardo David Caceres Fleitas explored how integrating midPoint with the OSS SIEM Wazuh enhances security, streamlines IGA, and ensures regulatory compliance. The presentation included a Read more about Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary[…]

AMI Praha: SAP SuccessFactors HR Webinar Summary

We organized a webinar within our MidPoint Integrations: Partner Series iniciative, led by AMI Praha‘s Chief Solution Architect, Martin Lízner, where you could explore Fortuna Entertainment Group’s shift from an on-premise HR system to an SAP SuccessFactors cloud solution thanks to midPoint. Martin explained how AMI Praha integrated this new HR system into their existing Read more about AMI Praha: SAP SuccessFactors HR Webinar Summary[…]

NIS2 Directive and Identity Governance

The NIS2 Directive of the European Union aims to increase level of cybersecurity in crucial sectors of industry and government. The directive introduces cybersecurity requirements that are expected to be applied consistently across the EU. The directive touches on many areas of cybersecurity, including identity governance and administration. Directive (EU) 2022/2555 of the European Parliament Read more about NIS2 Directive and Identity Governance[…]

Celebrating Women in Engineering 2024 – MidPoint Edition

The representation of women in engineering has been gradually improving over the years, although it remains a male-dominated field. In 2023, women comprised 15.7% of the engineering and tech workforce in the UK, down from 16.5% in 2022.[1] Data more specific to software engineers tells us some staggering statistics: In Europe, 19% of people in Read more about Celebrating Women in Engineering 2024 – MidPoint Edition[…]

EU Cybersecurity Landscape

The European Union is quite busy producing cybersecurity regulations. Several cybersecurity-related acts have passed during the last few years, and even more are on the way. The EU looks like it really means to improve cybersecurity. However, an avalanche of new legislation can be quite confusing. Let’s take a closer look at the EU cybersecurity initiative. […]

ISO 27001 Webinar Summary

ISO 27001 is an international standard for information security. It is guidelines for cybersecurity best practices used all over the world. Identity governance and administration (IGA) plays a major part. It is quite natural that midPoint, being a leading open source IGA platform, can be an essential tool for ISO 27001 compliance. […]

Navigating Digital Identity: Key Takeaways from an Interview at EIC 2023

We bring you an engaging discussion between Martin Kuppinger, the founder and Principal Analyst at KuppingerCole, and Slávek Licehammer, our Identity Governance Strategist and Global Identity Leader for Academia, recorded at the European Identity Conference 2023! Dive into the future of digital identity as Slávek shares his insights on distributed identity, eIDs, and e-wallets, and Read more about Navigating Digital Identity: Key Takeaways from an Interview at EIC 2023[…]

Flexible Authentication Webinar Summary

Authentication methods are constantly evolving. Today, traditional authentication with a username and password is not enough. There are different authentication methods that can be employed. That’s why we introduced the new concept of flexible authentication in midPoint 4.1. Authentication methods in midPoint can now be configured in many different ways using various combinations of authentication Read more about Flexible Authentication Webinar Summary[…]

Securing MidPoint 4.8: A Collaborative Effort

In a collaborative effort to bolster the security of midPoint, a grant provided by the NGI Zero Review program enabled us to cooperate with Radically Open Security, who performed an extensive security penetration testing exercise. This initiative underscores our commitment to fortifying midPoint against potential threats. Their expertise revealed a number of security weaknesses, each Read more about Securing MidPoint 4.8: A Collaborative Effort[…]