What I learned at @kuppingercole’s #EIC11: #identity #IAM #privacy and secrets
I must admit to being very selfish at this year’s EIC. Instead of going to the sessions that would likely have been most useful to Quest, I went to those that spoke most strongly to my own curiosities....
View ArticleApple’s iCloud IAM Challenges – Does Match Need ABAC?
I swear this is not just a hit grab. I know that’s what I think every time I see someone write about Apple. But the other day I was clearing off files from the family computer where we store all the...
View ArticleThe IP & Privacy Link – @Harkaway at #GartnerIAM
As the new season of conferences kicks into gear, I start to have thoughts too big to fit into tweets again. I once again had the pleasure of making it to London for the EMEA Gartner IAM Summit. There...
View Article“Security” is still seen as reactive controls & ignores IAM
There was an excellent article at Dark Reading the other day about data leaks focusing on insider threats. It did all the right things by pointing out “insiders have access to critical company...
View ArticleIAM Liaisons: Multiple Identities in the Days of Cloud & LARPing
I’m in the car listening to an NPR piece about LARPing while driving between meetings. Something they say catches my ear. It seems LARPers (is that even a word?) have an impulse to create immersive...
View ArticleSAML joins the IT zombie legions?
I’ve had the privilege to witness many IT funerals. By my reckoning, Mainframes, CORBA, PKI, AS400, NIS+, and countless others are all dead according to the experts. Of course, that means nearly every...
View ArticleIs the ID ecosystem #NSTIC wants too much risk for an IdP?
I’m gearing up to go to the NSTIC convened steering group meeting in Chicago next week. Naturally, my inner nerd has me reviewing the founding documents, re-reading the NSTIC docs, and combing through...
View ArticleIdP risks, social engineering customer service, & Mat Honan
The blogosphere is on fire with tales of Mat Honan’s being hacked (does anyone say “blogosphere” anymore?). The source most seem to be pointing back to is Wired’s article. The best thing I’ve seen is...
View Article#Identity as continuity. Thoughts inspired by #CISmcc.
I didn’t get to go to Cloud Identity Summit again this year. At least, not physically. I was there at a distance, attending via the very full twitter feed on #CISmcc. My experience was choppy. There...
View ArticleMoralizing #Privacy & #Security Victim Blaming in the iCloud #Hack
When JP Morgan got hacked, it was amazing how many people cried: “What sort of idiot would put their most personal financial information on the internet?” and “If someone accesses their bank account on...
View Article