Media & Publications Hub
Media & Publications Hub

Publications
Title | Where | When |
---|---|---|
Designing MFA for Humans | IDPro Body of Knowledge | Oct 2020 |
So You Think You Can Two-Factor | IDPro Newsletter (Members Only) | Nov 2019 |
Developers and Identity Services – Tackling Identity Data with Identity Hub (Archived) | Oracle Whitepaper | |
Service-Oriented Security: An Application-Centric Look at Identity Management (Archived) | Oracle Whitepaper | |
Attestation of Identity Information (Archived) | Oracle Whitepaper |
Podcasts
In The News
Title | Where | When |
---|---|---|
Your identity starts with the user interface: Designing for identity | SC Magazine Article | Jun 2022 |
Uniken’s REL-ID Security Platform Achieves FIDO2 Certification to Expand Customer Choices for Passwordless Authentication Across Channels | Press Release | Jun 2020 |
Uniken Announces Nishant Kaushik as Chief Technology Officer | Press Release | Apr 2017 |
Emerging Trends and Benefits of Cloud-Based Identity Management at Cloud Identity Summit 2013 | Press Release | Jun 2013 |
Identropy “Among Elite Group of Cloud Leaders” Participating in New York City edition of Cloud Identity Summit | Press Release | July 2010 |
Identropy Adds Nishant Kaushik as Chief Architect | Press Release | Jul 2011 |
Interviews
Title | Where | When |
---|---|---|
Nishant Kaushik talks about Transaction Processing Systems | Infosec Report | Jun 2023 |
Ep 18 – Nishant Kaushik | B in the Know | May 2019 |
Felix Gaehtgens of KuppingerCole interviews Nishant Kaushik [Oracle] at the European Identity Conference 2010 | European Identity Conference | July 2010 |
Quoted In
Title | Where | When |
---|---|---|
Why Do We Still Use Passwords? | Government Technology Magazine | Nov 2013 |
Identity Management In The Cloud | Dark Reading | Oct 2013 |
Cloud Identity Summit 2013: Standards Making Progress | Windows IT Pro Magazine | Jul 2013 |
When Active Directory And LDAP Aren’t Enough | Dark Reading | Mar 2013 |
Is Identity The New Perimeter? | Dark Reading | Feb 2013 |
Avoiding IAM’s Biggest Blunder | Dark Reading | Jan 2013 |
Single Sign-On Mythbusting | Dark Reading | Jan 2013 |
Three Security Snags That Expose The Database | Dark Reading | Apr 2012 |
Creating a key for every door | ZDNet | Apr 2012 |
Passphrases A Viable Alternative To Passwords? | Dark Reading | Jan 2012 |
The Top 5 Cloud Vulnerabilities | Your Security Resource | Jan 2012 |
Five Worst Practices In Database Encryption | Dark Reading | Oct 2011 |
Cloud IAM catching on in the enterprise | TechTarget | Sep 2011 |
Getting the band together again: Thor Technologies veterans reunite at Identropy | NetworkWorld | Jul 2011 |