Thinking about Matt’s Simple Question: Correlating accounts and people
Matt Hamlin, over at Sun, mentioned a conversation we had last week about a topic in identity management which doesn’t usually get a lot of airtime: the correlation of accounts to people. The...
View ArticleCA’s Acquisition of IDFocus
Yesterday CA announced its acquisition of IDFocus, a small Israeli company. Among other abilities, IDFocus provides a finer-grained segregation of duty (SoD) analysis engine. CA has previously...
View ArticleZen Mind, Newb Mind
Being the new-ish addition to the IdPS team is, well, an interesting place to be. Besides the requisite induction activities (ask me at Catalyst how you pick up the dry cleaning for a team who lives...
View ArticleNailing Down the Definition of “Entitlement Management”
Ian Yip’s take on access management versus entitlement management can be partially summed up with this equation: Entitlement management is simply fine-grained authorisation + XACML I have four...
View ArticleTransparent or Translucent?
Last week I was at the recent Department of Homeland Security’s Government 2.0 Privacy and Best Practices conference. Not surprisingly the subject of transparency came up again and again. One thing...
View ArticlePerforming an entitlement lobotomy on the enterprise
As a part of its data center consolidation efforts, HP is going to be letting going 9000 IT workers. As this Computerworld article points out, although not confirmed, it highly likely that at least...
View ArticleThoughts from IIW East
Last week was the first Internet Identity Workshop on the east coast. Having IIW in DC is especially timely given the identity-related activity here inside the Beltway. NSTIC: Worst. Card game. Ever....
View ArticleNo, really, who has access to what?
In the unceasing wake of the RSA breach, and especially given Art Coviello’s most recent post, I’ve been thinking about what role identity and access governance can play in mitigating post-RSA attacks....
View ArticleOur Platform
In case you didn’t notice, it’s an election year here in the States. So having taken over the reins of the IdPS research agenda, I wanted to get a jump on the candidates, and announce the first three...
View ArticleHow to Provision a Pope in 6 Easy Steps
Having deprovisioned your previous Pope, you thought your work was done. But just as soon as you’ve settled back into you desk chair you see it – white smoke wafting up from the chimney. It’s time to...
View ArticleThinking about Matt’s Simple Question: Correlating accounts and people
Matt Hamlin, over at Sun, mentioned a conversation we had last week about a topic in identity management which doesn’t usually get a lot of airtime: the correlation of accounts to people. The...
View ArticleCA’s Acquisition of IDFocus
Yesterday CA announced its acquisition of IDFocus, a small Israeli company. Among other abilities, IDFocus provides a finer-grained segregation of duty (SoD) analysis engine. CA has previously...
View ArticleZen Mind, Newb Mind
Being the new-ish addition to the IdPS team is, well, an interesting place to be. Besides the requisite induction activities (ask me at Catalyst how you pick up the dry cleaning for a team who lives...
View ArticleNailing Down the Definition of “Entitlement Management”
Ian Yip’s take on access management versus entitlement management can be partially summed up with this equation: Entitlement management is simply fine-grained authorisation + XACML I have four...
View ArticleTransparent or Translucent?
Last week I was at the recent Department of Homeland Security’s Government 2.0 Privacy and Best Practices conference. Not surprisingly the subject of transparency came up again and again. One thing...
View ArticlePerforming an entitlement lobotomy on the enterprise
As a part of its data center consolidation efforts, HP is going to be letting going 9000 IT workers. As this Computerworld article points out, although not confirmed, it highly likely that at least...
View ArticleThoughts from IIW East
Last week was the first Internet Identity Workshop on the east coast. Having IIW in DC is especially timely given the identity-related activity here inside the Beltway. NSTIC: Worst. Card game. Ever....
View ArticleNo, really, who has access to what?
In the unceasing wake of the RSA breach, and especially given Art Coviello’s most recent post, I’ve been thinking about what role identity and access governance can play in mitigating post-RSA attacks....
View ArticleOur Platform
In case you didn’t notice, it’s an election year here in the States. So having taken over the reins of the IdPS research agenda, I wanted to get a jump on the candidates, and announce the first three...
View ArticleHow to Provision a Pope in 6 Easy Steps
Having deprovisioned your previous Pope, you thought your work was done. But just as soon as you’ve settled back into you desk chair you see it – white smoke wafting up from the chimney. It’s time to...
View Article
More Pages to Explore .....