Media & Publications Hub
Media & Publications Hub
Publications
Podcasts
In The News
Interviews
Quoted In
Publications
| Title | Where | When |
|---|---|---|
| Designing MFA for Humans | IDPro Body of Knowledge | Oct 2020 |
| So You Think You Can Two-Factor | IDPro Newsletter (Members Only) | Nov 2019 |
| Developers and Identity Services – Tackling Identity Data with Identity Hub (Archived) | Oracle Whitepaper | |
| Service-Oriented Security: An Application-Centric Look at Identity Management (Archived) | Oracle Whitepaper | |
| Attestation of Identity Information (Archived) | Oracle Whitepaper |
Podcasts
In The News
| Title | Where | When |
|---|---|---|
| Your identity starts with the user interface: Designing for identity | SC Magazine Article | Jun 2022 |
| Uniken’s REL-ID Security Platform Achieves FIDO2 Certification to Expand Customer Choices for Passwordless Authentication Across Channels | Press Release | Jun 2020 |
| Uniken Announces Nishant Kaushik as Chief Technology Officer | Press Release | Apr 2017 |
| Emerging Trends and Benefits of Cloud-Based Identity Management at Cloud Identity Summit 2013 | Press Release | Jun 2013 |
| Identropy “Among Elite Group of Cloud Leaders” Participating in New York City edition of Cloud Identity Summit | Press Release | July 2010 |
| Identropy Adds Nishant Kaushik as Chief Architect | Press Release | Jul 2011 |
Interviews
| Title | Where | When |
|---|---|---|
| Nishant Kaushik talks about Transaction Processing Systems | Infosec Report | Jun 2023 |
| Ep 18 – Nishant Kaushik | B in the Know | May 2019 |
| Felix Gaehtgens of KuppingerCole interviews Nishant Kaushik [Oracle] at the European Identity Conference 2010 | European Identity Conference | July 2010 |
Quoted In
| Title | Where | When |
|---|---|---|
| Why Do We Still Use Passwords? | Government Technology Magazine | Nov 2013 |
| Identity Management In The Cloud | Dark Reading | Oct 2013 |
| Cloud Identity Summit 2013: Standards Making Progress | Windows IT Pro Magazine | Jul 2013 |
| When Active Directory And LDAP Aren’t Enough | Dark Reading | Mar 2013 |
| Is Identity The New Perimeter? | Dark Reading | Feb 2013 |
| Avoiding IAM’s Biggest Blunder | Dark Reading | Jan 2013 |
| Single Sign-On Mythbusting | Dark Reading | Jan 2013 |
| Three Security Snags That Expose The Database | Dark Reading | Apr 2012 |
| Creating a key for every door | ZDNet | Apr 2012 |
| Passphrases A Viable Alternative To Passwords? | Dark Reading | Jan 2012 |
| The Top 5 Cloud Vulnerabilities | Your Security Resource | Jan 2012 |
| Five Worst Practices In Database Encryption | Dark Reading | Oct 2011 |
| Cloud IAM catching on in the enterprise | TechTarget | Sep 2011 |
| Getting the band together again: Thor Technologies veterans reunite at Identropy | NetworkWorld | Jul 2011 |