News & Events

For educational information and company updates, explore the full range of our news postings. Want to get the news as it's published? Follow us on social media.

Planning a Trip to the Metaverse? Sounds Cool, but You’ll Need More than a Passport to Keep Data Secure Along the Journey.

It’s not surprising that there’s major buzz about educating through the metaverse! Learning about the human body by venturing into a realistic model of a brain to poke around and see what happens used to only be achievable via a fictional magic school bus, and now it’s at our fingertips as a tangible alternative to reading facts from a textbook. Not only is this uniquely interactive new form of education fascinating in its formulation for piquing students’ interest, but it appeals to the business side of educational institutions as well. Enrollment in higher education has been down due to the pandemic, and this adventurous learning method - a cutting-edge and creative step beyond the typical web-based classroom - may be a way to attract people who don’t want to do brick and mortar but would be open to online learning.  
Read More

Planning a Trip to the Metaverse?  Sounds Cool, but You’ll Need More than a Passport to Keep Data Secure Along the Journey.

Forging the Path to a Secure Environment: Key Steps for Scaling Organizations

As a small business or a startup, approaching security within your burgeoning company can seem overwhelming. On the journey to this point, you’ve probably come to know what security controls should be in place in some areas, you might know what security controls would be best practices, and you actually know that along the way, you kept a list of where your company is vulnerable. With that information at the ready, the questions are now: Where do I start? How intensely should I be addressing these issues? How do I create a timetable that will balance my resources with my risk?
Read More

Forging the Path to a Secure Environment: Key Steps for Scaling Organizations

What is IAL2? Digesting the Alphabet Soup of Identity in Healthcare

With the annual Civitas Conference fast approaching, and compliance always on the minds of many of the attendees, now is an appropriate time to discuss the alphabet soup of identity terms thrown around the healthcare industry. Rest assured, I am not going to cover HIPAA since this audience knows HIPAA has two “A’s” and not two “P’s.”   
Read More

What is IAL2? Digesting the Alphabet Soup of Identity in Healthcare

Starting Strong: How to Best Embark on Your Cybersecurity Journey

Most companies struggle when trying to identify a way to begin their cyber security efforts. Do we start with a tool? Or do we increase security expertise across the team? Finding the right way to begin our journey towards security can be intimidating at first, but once broken down into smaller steps, we begin to see that it’s far more approachable than we thought.
Read More

Starting Strong: How to Best Embark on Your Cybersecurity Journey

Understanding the Improving Digital Identity Act of 2022

On July 15, 2022, Senators Kyrsten Sinema (D-AZ) and Senator Cynthia Lummis (R- WY) introduced the long-awaited Senate version of The Improving Digital Identity Act.  The House version was introduced in June 2021 by Representative Bill Foster (D-IL) and Representative John Katko (R-NY).  Bipartisan sister bills in both chambers of Congress is newsworthy itself in 2022, but what it can do for everyday Americans is very promising. 
Read More

Understanding the Improving Digital Identity Act of 2022

3 Simple Steps to Building a Strong Security Foundation on a Budget

Got security? Does this question have you looking over your shoulder out of an initial sense of concern or uncertainty? For example, do you know if you have 24x7 logging and monitoring? Do you know if users from other countries can access your systems? Is it ok if your developer goes on vacation and logs in? Do you know if you have database or file level encryption? What would happen if your Director of Engineering fell for a phishing scam and a fraudster has their password?
Read More

3 Simple Steps to Building a Strong Security Foundation on a Budget

Born to Help: How Kuma’s Jenn Behrens Brings Her Experience in Social Work to Benefit Privacy & Security Clients

When Jenn Behrens was just 2 years old, her dad predicted that she would grow up to be a social worker because of her natural desire and ability to help others. “He always said he knew I was going to take care of people,” she says. He was right: Jenn went on to major in psychology in college and earned a master’s degree in social work — plus a PhD in public policy and administration. She spent more than a decade in direct-service social work like helping foster-care children and families before moving on to program management and oversight.
Read More

Born to Help: How Kuma’s Jenn Behrens Brings Her Experience in Social Work to Benefit Privacy & Security Clients

Kuma is the world’s first and only assessor to offer identity certifications for both the US and Canada

Kuma LLC, a global privacy, security, and identity company specializing in custom cybersecurity solutions, is pleased to announce their accreditation by the Digital Identity and Authentication Council of Canada as the first DIACC certified assessor and Readiness Advisor in the DIACC Voilà Verified Trustmark program. Building upon their success as the global market leader in NIST 800 63-3 assessments, Kuma is now the world’s first and only assessor to offer identity certifications for both the US and Canada, with certification for the UK’s Digital Identity and Attributed Trust Framework planned.
Read More

Kuma is the world’s first and only assessor to offer identity certifications for both the US and Canada

Digital Identity Certifications & Trustmarks are Not Just for Government Business Anymore: Why Risk Future Business Without Them?

As one peruses various vendor websites in the global identity and access management industry, words like "security", "trust", "privacy", and "secure" leap off the home pages. While each vendor does its best to differentiate itself from the pack, buyers are challenged to identify the “haves” from the “have nots” when it comes to meeting their unique internal or customer requirements, or complying with regulations in the jurisdictions they do business in.
Read More

Digital Identity Certifications & Trustmarks are Not Just for Government Business Anymore: Why Risk Future Business Without Them?

Beyond the Buzzword: What is the ‘Zero Trust Model’ and Why is it Essential?

To help understand the relatively new concept of the Zero Trust Model when it comes to data privacy and security, think of something very old: a castle from the Middle Ages. The traditional approach to security called for high walls, a moat, and a drawbridge all meant to fend off an outside attack. Those allowed inside the castle walls were considered trusted and had unchecked access. Applying the Zero Trust Model, the exterior barriers would remain, but additional interior measures would track everyone’s movements throughout the castle and reconfirm authorization prior to accessing any room. 
Read More

Beyond the Buzzword: What is the ‘Zero Trust Model’ and Why is it Essential?

End of content

No more pages to load