Cybersecurity | Cloud | DevelopmentGive User Access To Only One S3 Bucket Only May 19, 2023 video AWSbucketbucket-policyIAMPolicyS3Security
Cybersecurity | Cloud | DevelopmentIAM in AWS | Introduction IAM | How IAM Works | Episode 08 December 4, 2022 video AmazonAuthenticationAuthorizationAWScloudCloud ComputingHow IAM WorksIAMIdentity and Access Managementitsmarttraining
Cybersecurity | Cloud | DevelopmentÆVATAR streamlines citizens' confidence in everyday life August 11, 2022 video ABC for Trustadvanced track and tracecryptoexpertsdavid robertfrederic engelGDPR complianceGDPR enforcementIAMicoid walletID3 technologiesIdentity Management Platform as a serviceinstant messaging paymentinstant paymentsmobile identitypaaspersonal datapersonal data storeprivacy-by-designsmart security weektrustech 2016trustech 2017wariÆVATAR
Cybersecurity | Cloud | DevelopmentWedaCon Digital Identity Management Professional July 18, 2022 video digitalDigital Identity Management ProfessionalDigitalisierungIAMidentitätenidentityIDM
Cybersecurity | Cloud | DevelopmentIAM Spring 2019 – Biannual OSS Briefing June 1, 2022 video IAMIdentity and Access ManagementOpen Source SupportOSSOSS Briefingsustainable engineeringUnicon
Cybersecurity | Cloud | DevelopmentTalk Microservices to Me: The Role of IAM in Microservice Architecture, WSO2Con USA 2018 March 21, 2022 video analyticsapi managementCloud Computingcloud platformDigital TransformationIAMIdentity Managementintegrationinternet of thingsMicroservice ArchitecturemicroservicesmiddlewareOpen Sourcesan franciscoSecuritysoftwareusawso2wso2conWSO2Con USAWSO2Con USA 2018
Cybersecurity | Cloud | DevelopmentIAM Fall 2019 – Biannual OSS Briefing February 25, 2022 video IAMIdentity & Access ManagementIdentity and Access ManagementOpen Source SupportOSSOSS Briefingsustainable engineeringUnicon
Cybersecurity | Cloud | DevelopmentGluu and Plurilock Behavioral Biometrics Authentication Script. January 23, 2022 video authorization and authenticationbiometrcisFOSSgluugluu federationgluu serverIAMindentiy and access managementinterception scriptsjjanssen projectmachine learning for identiyopen source identity and accessplurilock
Cybersecurity | Cloud | DevelopmentEP-5 | What are AWS Regions and Availability Zones? | IAM | Visual Explanations November 16, 2021 video Amazon Web ServicesAWSaws certified solution architect associate 2020aws iamaws iam rolesaws iam roles and policiesaws iam tutorialaws iam tutorial for beginnersaws identity and access managementaws regions and availability zones explainedaws solution architect certificationIAMiam rolesIdentity and Access Managementmulti factor authentication explainedPythoholicRoadToAWS
Cybersecurity | Cloud | DevelopmentThe City of Siena & NetIQ Sentinel, Identity Manager, & Access Manager – Customer Success Story September 9, 2021 video Access ManagerCompliancedata centerData SecurityEnrico GiacomelliHRHuman ResourceIAMIdentity ManagerIDMinformation securitymanagementMicro FocusmicrofocusNet StudioNetIQNovellSentinelSergio CorbiniSienasoftwareTechnology