Identity Management Blog

How Can Machine Learning and Identity Management Contribute to your Cyber Security Program?
Read More
The Gartner Hype Cycle while a bit of an oversimplification, is a great tool to understand the evolution of a product or solution space. Gartner describes the hype cycle by placing "visibility" on the "y" axis and "time" on the "x" axis. Visibility of the solution space is greatest early on during the "Peak of Inflated Expectations". The identity space’s inflated expectations and unfulfilled ...
Another Gartner IAM Summit has come and gone and the theme of 2017's conference really followed (and confirmed) what I saw at RSA Conference and the Identiverse (aka Cloud Identity Summit) earlier in the year: It's time to start considering adding intelligence capabilities to your IAM tools, services, and programs.
The Identropy Advisory team recently came together and presented to a group of CISOs in Upstate New York. The topic: The High Cost of Not Doing IAM Right. As part of that discussion, we talked about how failing at Identity and Access Management (IAM) can lead to an increase not only in the number of breaches, but the costs associated with remediating them. While good IAM is hard, failing at it ...
Granting access to a user is an exercise in trust. This is why information security best practices preach following the principle of “least privilege” to mitigate the risk of trusting a user. But even when we give a user exactly and only the right privileges to do their jobs, we are still trusting them with those privileges and expecting them to use them for the right things. An important part of ...
I’m on the road again, sitting in a club lounge at O’Hare airport. It’s another typical Tuesday late morning with a decent number of people busy typing (or in some case hunting and pecking) through emails. With that setting here is a recap of a scenario that has just played out just a few feet from me:
I’ve always heard that no two snowflakes are exactly alike. I don’t know if this is true, but I’m willing to accept it as a fact. No two clients are identical; they all have different IAM needs, target systems, processes and procedures. No two IAM implementations will ever be alike, but if we consider this situation with an open mind we will see that in the early stages of an IAM implementation ...
Pokemon Go has taken the world by storm.  There are currently more Pokemon Go users than Twitter users in America. Pokemon Go has been out in the U.S. for 7 days. Let that sink in for a second. It took 7 days for an application to have more users than Twitter in America.  As big an event as it is, the launch has been troubled by numerous issues. Two of the most prominent are: