Rational Cybersecurity New Year Update
Updating the public on cybersecurity trends is not a trivial matter. At least to me, it is a vast potential topic space. Let’s outline it here and communicate further in the New Year.
My World and Rational Cybersecurity
After a… Continue reading
Blockchain and Decentralized Identity Presentation for ISACA GWDC Chapter
Security Architects Partners’ Dan Blum will be speaking September 20, 8:30 AM, at the ISACA Greater Washington DC Chapter’s Cybersecurity and Risk Conference (Register). Here is the presentation abstract:
Blockchain Technology and Concepts of Decentralized Identity
Blockchains are… Continue reading
GDPR Unsubscribe Notice
This blog uses a service called Mailchimp to mail copies of new posts to persons that have previously subscribed to receive them. To be able to do this, Mailchimp stores a copy of the subscribers’ names and email addresses … Continue reading
Asking the Right Privacy-By-Design Questions at #CIWUSA17
Privacy-by-Design technical and business process engineering important for solving business GDPR compliance challenges. But the privacy issues and enforcement questions around GDPR are pretty complex. How should companies begin?
The Consumer Identity World conference will be starting in just a… Continue reading
Speaking at Consumer Identity World USA 2017
I will be speaking on “The Changing Fate of CIAM” at KuppingerCole’s Consumer Identity World 2017 conference.
LOCATION: Seattle
DATE: Tuesday, September 12, 2017 – Wednesday, September 13, 2017
I’ll also be on a “GDPR… Continue reading
The Second Golden Age of Identity
We are now in the second golden age of identity and access management (IAM). Mobile devices, cloud computing, social networks, Big Data, and the Internet of Things (IoT) require radically improved capabilities. They are driving rapid innovation in IAM standards,… Continue reading
Planning for the Post-Safe Harbor Era
The European Court of Justice’s demolition of Safe Harbor two months ago has spawned a host of data residency compliance questions from clients, former clients and prospects: What privacy and security due diligence should companies perform as they use,… Continue reading
Cloud Security Decision Frameworks (Part 2)
Sometimes it seems as if companies are moving deeper into the cloud every day by any means necessary with or without security on board. Unsanctioned shadow IT initiatives abound as well as sanctioned business initiatives or … Continue reading
How to Minimize Stored Identity Data and Breach Risk
Why do organizations often behave like pack rats – over-storing identity data again and again even after seeing so many peers suffer breaches and put their employees or customers at risk? A recent post by… Continue reading
Safe Harbor is Dead – Now What?
Tuesday October 6, 2015 the European Court of Justice struck down Safe Harbor, an international agreement that allowed companies to move digital information between the the United States and Europe. According to a New York Times article, “… Continue reading