We are now in the second golden age of identity and access management (IAM). Mobile devices, cloud computing, social networks, Big Data, and the Internet of Things (IoT) require radically improved capabilities. They are driving rapid innovation in IAM standards,… Continue reading
Shadow IT is an explosion of cloud computing adoption for business use by employees and groups with no IT involvement. Shadow IT can lead to unintended and undesirable security risks, compliance concerns and hidden costs. But through collaborative IT… Continue reading
Security culture is a fascinating subject deserving of more coverage. Last month’s KuppingerCole European Identity Conference (EIC) had Cybersecurity Leadership as one of its themes. And Thom Langford, from Publicis Groupe, made the connection.
Security business case justification is always a complex task for two reasons. First, security earns its keep by reducing risk of losses, not by producing revenues. Second, estimating both the size of losses to security incidents, and the extent… Continue reading
Agile cloud security was on stage at #RSAC2016 where I came face to face with its practitioners already living the solutions to problems some of our clients are only now discovering. My favorite sessions – from Javier Losa and Iñigo… Continue reading
The Cloud Access Security Broker (CASB) is an architectural concept become an over-sized security market category. Many of the pieces in the CASB model are necessary for coherent cloud security policy enforcement. But is a unified CASB solution as presently… Continue reading