There is still a need for network segmentation in the zero trust era, but it needs to be software-defined. Otherwise, traditional network segmentation will be over-whelmed by the growing number of access and component interactions today’s applications require. Late… Continue reading
Active Directory security is a critical infrastructure issue for almost all large global organizations, including those using identity-as-a-service (IDaaS) solutions. IDaaS deployments frequently synchronize cloud-based directory accounts or passwords from the premise-based AD installation. Or, even if the IDaaS (e.g.,… Continue reading
Security Architects Partners is circulating an IAM Top 5 Funding Drivers Survey. Note that it is still open and you’re welcome to add your response. Our goal is to eventually get enough responses to be able to slice and dice… Continue reading
FIDO, Finally, Almost: Passwordless authentication is now becoming a possible dream, thanks to the ongoing standards work at the Fast Identity Online (FIDO) Alliance and the collaboration between competitors, such as Microsoft and Google.
Sources: RSA Conference 2018 (upper figure),… Continue reading
Dan Beckett will be speaking Thursday at the following event. If desired, please register with the Meetup group at this link.
DATE and TIME:
Thursday, August 17, 2017
3:30 PM to 6:30 PM
Dave and Buster’s
13857… Continue reading
Digital identity’s center of gravity has shifted to customer-facing identity (CIAM). As we learned in the changing face of identity (part 1 of this post), effective CIAM is crucial.
Ian Glazer, who inspired my last two posts… Continue reading
Digital identity is the core of the digital transformation. It underpins sales and distribution, enables outreach to customer communities, and helps build business value chains. But organizations must traverse a minefield of threats, operational challenges, and compliance issues. As we… Continue reading