Identity Management Blog

Listen to Identropy's Jim McDonald and Jeff Steadman on their podcast at "Identity at the Center".
Read More
Listen to Identropy's Jim McDonald and Jeff Steadman on their podcast at "Identity at the Center".
Listen to Identropy's Jim McDonald and Jeff Steadman on their podcast at "Identity at the Center".
Listen to Identropy's Jim McDonald and Jeff Steadman on their podcast at "Identity at the Center".
Listen to Identropy's Jim McDonald and Jeff Steadman on their podcast at "Identity at the Center".
Listen to Identropy's Jim McDonald and Jeff Steadman on their podcast at "Identity at the Center".
Listen to Identropy's Jim McDonald and Jeff Steadman on their podcast at "Identity at the Center".
How Can Machine Learning and Identity Management Contribute to your Cyber Security Program?
As more company business units explore and adopt Software as a Service (SaaS) solutions for their technology needs, IT security groups struggle to keep the “gathering clouds” from raining on their secured environment.  On the bright side, these organizations have a very strong security foundation in place for internally hosted applications. The challenge is simply to extend their secure identity ...
What does marketing have to do with cloud Identity Management?  Quite a bit, it seems. Last week, HMV (a European retailer) laid off 190 employees.  Among those being let go included Poppy Rose, the HMV "Community Manager" who happened to be in charge of their twitter account.  The result?  See for yourself...