FIDO2 Moves Forward with Passwordless Authentication
FIDO, Finally, Almost: Passwordless authentication is now becoming a possible dream, thanks to the ongoing standards work at the Fast Identity Online (FIDO) Alliance and the collaboration between competitors, such as Microsoft and Google.
Sources: RSA Conference 2018 (upper figure),… Continue reading
Microsoft Uplevels Data Protection With Azure Information Classification and Labeling Features
In our KuppingerCole report “Exploring the Microsoft Azure Information Protection Landscape” (subscription required) we describe Microsoft’s Azure Information Protection and it’s industry impact.
Azure Information Protection Summary
Clients’ data protection challenges span multiple technologies, including data leakage… Continue reading
Blockchain Security Concerns and Un-Concerns
Interest in blockchain has skyrocketed, with many believing the technology to be as transformational as the Internet itself. Blockchain’s promise boils down to two related propositions: first, that it can enable vast decentralized populations to collaborate and transact business; second,… Continue reading
Pathways to an Enterprise Security Architecture (ESA)
Although most security pros agree that having clear blueprints is important, some question whether an enterprise security architecture (ESA) is actually worth the effort. We tackle these questions in a Leadership Brief (free with registration) for KuppingerCole. This post… Continue reading
The OAuth Standards Stack: An Architectural Perspective
The OAuth standards stack is racing to keep up with the growing inter-connectedness of cloud, IOT, social networks, e-commerce, individuals, and enterprises on today’s Internet. The menu of new standards options can seem bewildering – especially since some are still… Continue reading
Kansas City Here I Come
Sign up here for the next Kansas City IAM User Group gathering on November 8 at 3:00-5:00 PM to see our very own Dan Beckett and Doug Simmons speak at Lidia’s – an upscale northern Italian restaurant!
Meetup Announcement
We… Continue reading
How to Build Security and Risk Management into Agile Environments
Agile security and risk management are possible. This post is the third of three covering agile security challenges, opportunities, and good practices. It also discusses the taxonomy and instrumentation required to operationalize an agile risk management framework down to the… Continue reading
Attributes are Beautiful Tour Coming to New York City
Register here to see us on October 12 at the New York IAM Users Group where Dan Blum will speak on the meme “attributes are beautiful.”
Don’t get us wrong, the architecture in the picture isn’t for everyone and… Continue reading
Speaking on Third Party Risk at the FAIR Institute Chicago Chapter Meeting
Dan Beckett and Dan Blum from Security Architects Partners will be speaking at the Factor Analysis of Information Risk (FAIR) Institute Chicago Chapter meeting.
When: Thursday, October 5, 2017, 3:30 – 5 PM CDT
Where: Northern… Continue reading
Asking the Right Privacy-By-Design Questions at #CIWUSA17
Privacy-by-Design technical and business process engineering important for solving business GDPR compliance challenges. But the privacy issues and enforcement questions around GDPR are pretty complex. How should companies begin?
The Consumer Identity World conference will be starting in just a… Continue reading