The Second Golden Age of Identity

We are now in the second golden age of identity and access management (IAM). Mobile devices, cloud computing, social networks, Big Data, and the Internet of Things (IoT) require radically improved capabilities. They are driving rapid innovation in IAM standards, technology, and architecture. In the face of cybercrime and cyber-conflict, post-modern IAM must also address … Continue reading The Second Golden Age of Identity