Dan Beckett will be speaking Thursday at the following event. If desired, please register with the Meetup group at this link.
DATE and TIME:
Thursday, August 17, 2017
3:30 PM to 6:30 PM
Dave and Buster’s
13857… Continue reading
Digital identity’s center of gravity has shifted to customer-facing identity (CIAM). As we learned in the changing face of identity (part 1 of this post), effective CIAM is crucial.
Ian Glazer, who inspired my last two posts… Continue reading
Digital identity is the core of the digital transformation. It underpins sales and distribution, enables outreach to customer communities, and helps build business value chains. But organizations must traverse a minefield of threats, operational challenges, and compliance issues. As we… Continue reading
Data protection requires effectively coordinating good practices across many security domains. It is actually a large subset of the overall security program. Take a look:
If you’re familiar with Security Architects Partners, you’ll know we’re both broad and deep in… Continue reading
We recently completed a consulting engagement to create an authorization framework for a large financial services organization. As illustrated, the framework has three dimensions: Runtime authorization patterns, policy models, and governance structures.
The “runtime authorization patterns” describe the components, interfaces,… Continue reading