Identity

GDPR Post Brexit – Are You Getting Ready?

The European General Data Protection Regulation presents the most significant change to data protection in the UK and EU since 1995.  It’s been discussed in the EU for the last four years so hopefully, they have taken that time to ensure that in practical terms it will work. It will come into force in May…

Cybersecurity’s Poverty Gap

As we pass the halfway point of 2016, the United States Presidential election process is in full swing. Candidates continue to make the case for why their worldview is in the best interests of the nation. Perhaps no other topic polarizes the candidates and receives more prominence in this context than wealth inequality. Within cybersecurity,…

RSA Via Lifecycle and Governance Named a ‘Leader’ in 2016 Forrester Wave: Identity Management and Governance Report

RSA is happy to announce that RSA Via Lifecycle and Governance has been recognized as a ‘Leader’ in The Forrester Wave™: Identity Management and Governance Q2, 2016 report!  (View and download the report here) Forrester evaluated 9 of the most significant Identity Management and Governance providers across 17 criteria, and recognized RSA Via Lifecycle and…

Beginning the Journey to Cybersecurity Maturity

RSA just released results of our second annual RSA Cybersecurity Poverty Index. We’re really excited about the results, but it may not be for the reasons you think. We’re excited because of the number of respondents (more than double the 2015 Index), the breadth of industries and governments represented, and the amount of time organizations…

“I am an imposter.”

I was invited to give a keynote at the Cloud Security Alliance (CSA) Congress in Dublin recently, on behalf of my EMC colleague Said Tabet. Two years before, I had spoken at the CSA Congress in Rome about the EU-funded SPECS and SPARKS projects and their relevance to cloud in terms of GRC and security analytics.…

Identity for Modern IT: A New Appreciation for User Experience

The following is a simple analysis that puts into perspective the user experience of modern IT that organizations typically require their users to endure: Imagine a midsize enterprise with 1,000 users, each of whom has between one and three devices that connect to the enterprise infrastructure. Each user has installed between 25 and 100 applications…