Lately the proposals for “identity oneness” are back in force. And for me, deja vu. I’ve been through the year of PKI and so many grand efforts that I long ago came down on Kim Cameron’s side that what we… Continue reading
Peter Brown, Chair of the U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC’s) Identity Ecosystem Steering Group (IDESG) Management Council delivered the User-Centric Identity (UCID) Live Conference keynote last Tuesday in Washington, DC. In this role, he was standing… Continue reading
Last Thursday CEO Sanjay Tandon “declassified” the “#1 cyber security risk to Active Directory.” When Sanjay contacted me, I wondered if he’d found a new code vulnerability in Windows and whether this was going to be a responsible disclosure… Continue reading
Broad deployments of federated identity have arrived in the form of social login. But in 2013 we find federation on the horns of a dilemma; can it be both broad and strong?
Federated identity, especially in the form OAuth… Continue reading
About a year ago, I read an article in Wired by Mat Honan called “How Apple and Amazon Security Flaws Led to My Epic Hacking.” At the time I was working as one of Gartner’s two main anti-malware… Continue reading
You thought you heard a click behind that site’s “Sign in with Facebook” button. But did you also hear the inaudible sigh of your personal data disappearing into the maw of yet another application?
Social login is the ability to… Continue reading
I recently developed a “history of federated identity” diagram and marveled at how it was similar, in many ways, to slides I created while working at Burton Group in 2004. Let’s take a look at a few diagrams and see… Continue reading