identity

Answering the #1 Question in Identity Management

Takeaways from a Recent Identity Survey by IDG It’s the infamous joke we’ve all used at one point or another – “Knock, knock. Who’s there?” When it comes to identity management, knowing the answer to this question is mission critical. Whether your employees, contractors, customers and partners are accessing your data, applications and systems in…

What do RSA Conference 2017 and my DVR have in common?

Another year, another RSA Conference. At this point, I have lost count of my appearances at this annual gathering of all things security – I believe it was number 15 or 16 for me. I say “appearances” because the days blur into such a steady stream of meetings, discussions and general sensory overload that at…

Reimagine Your Identity Strategy

We are at the edge of yet another evolution for the Identity and Access Management (IAM) industry. Applications are being deployed at incredible speeds with user populations demanding access from wherever they are, whenever they want, from any device. The network is no longer clearly defined, in fact, identity is the new perimeter. Regulations and…

Identity Comes into Focus at RSA Conference

We are less than two weeks away from RSA Conference, the world’s largest security event! This year’s theme – The Power of Opportunity – emphasizes “unity.” Clever, right? We think so. Not only is it a great time to call for unity in cybersecurity among vendors and practitioners, but also end users. Every day we’re…

R-Evolution: The Evolution of Risk

Ten years ago, when a user needed to access a corporate application, his or her usage was on a company-owned device and typically confined to company-owned networks. These applications were nicely tucked behind corporate firewalls, and managed by dedicated IT organizations. To identify themselves, users would often enter complex, lengthy passwords when accessing such resources,…

Slow Down! You’re in a Public Environment

These days, if you’re planning to spend time at an airport terminal or a coffee shop – it’s likely that you’ll look for a public Wi-Fi hotspot to connect to, and perhaps a charging station, to make sure you don’t run out of power. While our distraction level is  high when we’re out and about…

Identity and Access Management Strategies: IAM Spending to Increase in Europe

Businesses around the world recognize that it’s crucial to take the necessary precautions to verify identities and manage digital credentials when conducting business online. In fact, a recent study by Pierre Audoin Consultants (PAC) found that 93% of 200 polled European businesses claimed that they planned to maintain or increase their identity and access management…

“I am an imposter.”

I was invited to give a keynote at the Cloud Security Alliance (CSA) Congress in Dublin recently, on behalf of my EMC colleague Said Tabet. Two years before, I had spoken at the CSA Congress in Rome about the EU-funded SPECS and SPARKS projects and their relevance to cloud in terms of GRC and security analytics.…

IDaaS, the New Identity White Whale or the Fish That Shouldn’t Get Away?

In Herman Melville’s epic novel Moby Dick, a crazed mariner wildly pursues an unattainable beast with tragic consequences. So too can the pursuit of identity solutions that give visibility to and control over cloud, mobile, web, and legacy applications feel like a wild quest. To this end, many organizations following the general IT trend of…

The Economics of Identity Theft in the Dark Web

If you ever want to find a reason to boycott the Internet, just go work for a security vendor.  The digital universe is a scary place, and the cybercriminals who operate within it never cease to amaze me with the level of sophistication they harness in their Dark Web businesses. The black market, although rife…