Identity Management Blog

Regardless of whom you plan to vote for on November 6, 2012, you have to admit that voting is pretty inconvenient. I live in North Carolina where we have early voting available. You can go online (if you can find the website) to find out which voting stations are open early. I went to one on the first day and was greeted with an hour-plus wait. I work during the day so I left – frustrated. I will have to return another day, because I cannot cast my vote electronically through a PC or mobile device.
Read More
Wired has the kind of article that will make all of us leading highly digitized lives (is that the right term?) wake up in a cold sweat. While the title - How Apple and Amazon Security Flaws Led to My Epic Hacking - may strike many as sensationalist, the article does a good job of showing just how the rappel ropes of our digital lives have mushroomed into a beast that we can't manage or hardly ...
RWW Enterprise just covered the latest update of PingFederate in an article titled It's PingFederate 6.6 Versus "Identity as a Service". I couldn't pass up the opportunity to comment on some details that made me cringe, so naturally this blog post was born. Please note that this is not about PingFederate in specific, a product I have no in-depth knowledge of. It's about identity concepts and ...
Last week, the Kantara Initiative announced that it received final approval of their Trust Framework Provider (TFP) program as the only Approved US Government TFP certifying Levels of Assurance (LoA) 1, 2 and 3 non-crypto (non-PKI).
2010 has been a very eventful year for identity.   It has been a solid year chock full of M&A activity and innovations – all good signs that Identity and Access Management (IAM) continues to be a vibrant and relevant space in the information security market.  Below are some rants on my perspective of the events in IAM in 2010.
Last week, I attended ArcSight’s Protect 10 User Conference, and just like last year, it was an exciting and informative event.  Without a doubt, HP’s acquisition of ArcSight brought more excitement to this event this year.
Back to the initial point of this article...
It has to, there is just no other way...
After reading very interesting posts by Earl Perkins at Gartner, an article from Deloitte on financial institutions making Identity and Access Management (IAM) their #1 priority, and my friend Nishant Kaushik's recent series on Federated Provisioning and the Cloud, which is brilliant and thought provoking (nicely done Nishant); I felt compelled to chime in.
 I am just returning from a week of travel and conference activity, which start for me in Newark, NJ on Monday March 1, from there to Atlanta, GA for the HIMSS Conference 2010 (north of 25,000 attendees), and then on to San Francisco, CA on Wednesday March 3 for the last 2 days of RSA Conference 2010 (about 16,000 attendees), and then back home in NJ on Friday March 5. In all, last week was very ...