Identity Management Blog

How Can Machine Learning and Identity Management Contribute to your Cyber Security Program?
Read More
I am currently sitting in the United Club at O’Hare Airport on a relatively busy Tuesday morning. There is the usual smattering of hurried travelers milling around.   Among those are the busy professionals with their laptops out, earpieces in, and working on all sorts of tasks.   To my left, is a gentleman working on a presentation detailing the key sales figures for a major national retailer.
Most things that took computer access years ago are now able to be done with a few finger taps of a smartphone: Checking our account balance, making a car payment, and even monitoring blood sugar, to name a few. But in the last few years, many have integrated smart homes into their everyday lives: Climate control; monitoring door and window locks; video surveillance… the future is now, many say, ...
Many events, current and otherwise, have changed the way we look at security. From the recent Panama Papers scandal to companies investing considerable assets into security (Microsoft being one, who’s invested $1 billion from 2014-2015), it’s obvious there’s a need to integrate strategies throughout an entire enterprise, and not just patches.
You have followed the high-level plan “How Do I Get Started Building an Identity API” and at this point have a solid Identity API with initial success from your pilot users. But all the work that went into getting this far doesn’t matter if it never moves beyond this point. Evangelizing and marketing your Identity API is critical to ensure continued adoption and long-term value, you need to have ...
News of the Heartbleed bug has made more headlines than Miley Cyrus this week, which in itself is a good thing, but that's not the silver lining I'm referring to. If you haven't heard about it, Heartbleed is a security vulnerability that exists in OpenSSL versions 1.0.1 through 1.0. Basically, a coding mistake made back in 2012, led to a vulnerability where an attacker could access unencrypted ...
No blog about National Cyber Security Awareness Month would be complete without the obligatory link to the Department of Homeland Security’s (DHS) official website on the topic – after all, they started it 9 short years ago.
Anyone following me on Twitter is well aware of my stance on AddressBookGate. While the tech world's initial outrage was being directed at Path, I felt that a more balanced conversation would also lay some culpability at the feet of Apple and other API platforms that were exposing data to applications like Path without any controls in the first place.