Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Decentralized Identity Explained

You're reading from   Decentralized Identity Explained Embrace decentralization for a more secure and empowering digital experience

Arrow left icon
Product type Paperback
Published in Jul 2024
Publisher Packt
ISBN-13 9781804617632
Length 392 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Rohan Pinto Rohan Pinto
Author Profile Icon Rohan Pinto
Rohan Pinto
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1 - Digital Identity Era: Then
2. Chapter 1: The History of Digital Identity FREE CHAPTER 3. Chapter 2: Identity Management Versus Access Management 4. Part 2 - Digital Identity Era: Now
5. Chapter 3: IAM Best Practices 6. Chapter 4: Trust Anchors/Sources of Truth and Their Importance 7. Chapter 5: Historical Source of Authority 8. Chapter 6: The Relationship between Trust and Risk 9. Chapter 7: Informed Consent and Why It Matters 10. Chapter 8: IAM – the Security Perspective 11. Part 3 - Digital Identity Era: The Near Future
12. Chapter 9: Self-Sovereign Identity 13. Chapter 10: Privacy by Design in the SSI Space 14. Chapter 11: Relationship between DIDs and SSI 15. Chapter 12: Protocols and Standards – DID Standards 16. Chapter 13: DID Authentication 17. Chapter 14: Identity Verification 18. Part 4 - Digital Identity Era: A Probabilistic Future
19. Chapter 15: Biometrics Security in Distributed Identity Management 20. Index 21. Other Books You May Enjoy

Challenges and future directions in IAM security

IAM is the foundation of contemporary cybersecurity, ensuring data privacy and regulatory compliance while safeguarding user access to digital assets. As the digital ecosystem changes, IAM security confronts new problems and must adapt to meet future expectations. In this section, we will look at the major difficulties that IAM security is now facing, as well as the future paths it must take to properly handle these challenges:

  • Evolving threat landscape: As attackers utilize innovative tactics to breach user identities and obtain unauthorized access, cyber dangers are getting more complex. To successfully identify and respond to developing threats, IAM security must combine sophisticated threat detection, behavioral analytics, and AI-driven security solutions.
  • Legacy systems and silos: Many organizations continue to rely on outdated IAM systems that are not connected with one another, resulting in identity data silos and...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime