TrustBuilder Blog

Stay up to date on Identity and Access Management, trust in digital ecosystems, retail banking and other industries.

2
A strong and vibrant branding for TrustBuilder

Blue for trust. Magenta for energy. The new branding of the unified TrustBuilder is a clear manifestation of what the organization stands for. The new logo, color scheme and revamped website signal the ambition of TrustBuilder as a leading European player in the cybersecurity market.

trustbuilder_logo.png
Building a European IAM Leader: inWebo and TrustBuilder continue as TrustBuilder

TrustBuilder and inWebo have officially become one organization. Rebranded as TrustBuilder, the united organization is dedicated to delivering the highest quality solutions for identity protection and access management across digital environments. To emphasize the renewed dynamics of the new organization, the TrustBuilder logo and branding was revamped.

IAM1E17-Sponsors-970x250px
5 good reasons to visit Gartner’s IAM Summit, and TrustBuilder’s booth

Concerned about offering secure yet seamless access to digital assets? Chances are you’ll be visiting the Identity and Access Management (IAM) Summit that Gartner is hosting in London on March 6th and 7th. It goes without saying that TrustBuilder will be there too, so do come and visit our booth. We offer you five good reasons to do...

Illustration-B_large
Value does not come from silos – digital ecosystems are the way forward

Can you share more data by sharing less data? Yes, you can! In an interview, Björn De Vidts of the Flemish Data Utility Company, explains how data minimization, data vault technology, self-sovereign identity and Identity and Access Management can make citizens and companies place more trust in sharing data.

800-x-384_renewed-1
How to counter the most common cybersecurity threats

The past few years have been overwhelming when it comes to cybersecurity. The Data Breach Investigations Report says it’s difficult to still be surprised by what comes our way in the murky world of cybercrime. Many of the most common cyber threats can be countered by an IAM solution.

800-x-384
Security breach? Don’t blame the user!

Companies are investing heavily in making users alert to the dangers of phishing. At the same time, companies are underinvesting in security infrastructure. Wouldn’t it be better to make sure that IT security is so airtight that users don’t constantly have to be wary of potential breaches?