Binod Singh

Binod Singh has charted an illustrious 30-year career in the Information Security industry. As one of the pioneers of the 'Identity and Access Management' domain, he has worked with various organizations across the globe, shaping cyber-security strategies and building breakthrough technologies. He is the Founder, Chairman of the Board, and President of Ilantus Technologies, recognized as an Innovation leader in Identity and Access Management by KuppingerCole. Associated with several social initiatives, Binod believes in building corporate policies that intrinsically factor in the development of the underprivileged. The consummate professional, he is an inspiring mentor, avid reader, lover of good music, and enjoys well-made cinema. Read more...
Cyber Security

The 5 C’s of Security for Businesses on Cloud

LogicMonitor’s Cloud 2025 study, fielded in mid-2020, found that 87% of global IT decision-makers agreed that the COVID-19 pandemic will…

Read More »
Cyber Security

Is the Industry Headed Towards IAM as a Service?

According to industry analyst Gartner, more than 80% of software vendors will change their business model from traditional license and…

Read More »
Cyber Security

Identity Management – A Landscape Trying to Fit Square Pegs into Round Holes

Ever tried to fit a square peg into a round hole? Doesn’t work, does it? It is futile to even…

Read More »
Cyber Legality

Corporate Network Snooping: Employee Behavior Exposed!

Question for you, the reader – “In your experience, do EMPLOYEES ever attempt to access information that is not necessary…

Read More »
Cyber Security

5 Signs Your Business Needs Identity and Access Management

Your organization’s top management is doing everything it takes to scale the business and ensure the brand enjoys goodwill and…

Read More »
Cyber Security

The Golden Triangle of IAM

There are three key dimensions that are extremely important for the success of any IAM solution. Any identity and access…

Read More »
Security Culture

CFO, Cybersecurity is Your Responsibility Too

The people that make up the C-suite in an organization are the ones who ultimately hold the company together. Working…

Read More »
Security Culture

Role of Identity and Access Management for An Incident Response

You hear reports of data breaches of different scales every other day. Sometimes the companies are applauded for the way…

Read More »
Cyber Security

Machine Learning for Zero Trust – How Can It Be Done?

Zero trust is the security way forward. If you have been aware of the cybersecurity industry, then you know that…

Read More »
Cyber Security

Rise of Machines – How to Protect Their Identities?

When we think of machines and their rise, automatically, our mind goes to the series of sci-fi movies that have…

Read More »
Back to top button
X

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.