JOIN OUR BLOG BLOG

STAY AT THE CENTER OF IDENTIVERSE

November 16
The evolution continues- calling all presenters!

Andi Hindle | Identiverse Content Chair

In case you missed the news at Cloud Identity Summit in June, we announced that CIS would be renamed to Identiverse. But with the name change, we’re keeping the core qualities of CIS intact: the family program, the great networking opportunities, the awesome parties, and—of course—the highest-quality speakers covering the most relevant topics in identity. […]

November 14
How Do Security Pros Understand Privacy?

Steve Wilson | Constellation Research

Privacy is contentious today. Some say the information age has brought real changes to privacy norms. With so much private data leaking through breaches, accidents and digital business practices, it’s often said that ‘the genie is out of the bottle’. Many think privacy has become hopeless. Yet in Europe and many jurisdictions, privacy rights have […]

November 07
It’s Time for the Identity Ecosystem to Grow Up

Andrew Nash

Over the last 15 years, we’ve seen an enormous amount of great work go into designing modern identity systems—from SAML V1 kicking off the concept of identity federations to OpenID Connect and OAuth. Today, we’re still largely focused on how identities are created, verified (at your favorite assurance level) and authenticated—or if you’re really adventurous, […]

August 31
A Profession United

Ian Glazer | Senior Director, Identity Salesforce

At Cloud Identity Summit 2017 in Chicago, we were delighted to announce the formation of IDPro as a standalone non-profit (501(c)(6)) organization. IDPro has been over two years in the making. I spoke publicly about the effort at the European Identity Conference in 2016 and invited interested identity professionals to pledge their interest. Within weeks, […]

June 14
Identity is Transforming Financial Services

Emma Lindley | CEO & Founder at Innovate Identity

Digitalisation is changing the financial services world at an unprecedented rate. This change is being driven from top down regulations and directives such as  the EU’s General Data Protection Regulation (GDPR), the UK’s Open Banking regulation, the EU’s revised Payment Service Directive (PSD2) and the EU’s 4th Anti-Money Laundering Directive (4AMLD). It also being influenced […]

May 17
Scattered Clouds: A Global Identity Infrastructure

Will Rose | Netflix, Inc.

It is no industry secret that Netflix moved early and earnestly to build a global streaming platform on top of Amazon’s public cloud infrastructure. It’s a lesser-known fact that this also extended to all corners of the enterprise, including our workforce and partner Identity infrastructure. A cloud-only approach to Identity infrastructure necessarily brings along expectations […]

May 16
Addressing Identity Risk Factors in the Age of “Need It Now”

Jim Ducharme | RSA

In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We’re allowing access to a growing and dynamic user population that includes not only employees but business partners, customers, channel partners and contractors. And, while the […]

May 15
A Primer on APIs – Opportunities, Risk, and Remediation

Jon Lehtinen | GE

APIs offer premade services, utilities, and integration points that allow applications to deliver rich features without requiring the application itself to write each component. This presents a significantly reduced barrier of complexity and time to value for application offerings both commercially, and in the enterprise. That’s said, those same integration points that extend app capability […]

April 28
In CIAM, Pay Attention to the Entry Nodes

Nishant Kaushik | Uniken

When you think of customer identity and access management (CIAM), what do you think of? One of the first things I think of is a network. That’s because I believe security teams need to map out all the different ways in which your customer interacts with you, and how they end up authenticating themselves in […]

April 27
CIS Tweet Jam Highlights

Andi Hindle | Cloud Identity Summit

Last week, we hosted the annual #cloudidsummit Tweet Jam. Identity experts were tweeting about this year’s theme of ‘Intelligent Identity’ as a preview to the conversations we expect at CIS in June. The best news of all is a special promotion that was announced during the Tweet Jam that you can use even if you […]


“Edge” Identity and Access Management

Paul Madsen | Ping Identity

The premise of “fog” or “edge computing” is that some processing of Internet of Things (IoT) device data occurs near the device rather than being communicated up to the cloud for analysis there. A key advantage for such local processing is the potential for more dynamic and timely analysis. Would you want your self-driving car […]

April 25
Fulfilling IoT’s Promise with Identity Standards

Ian Glazer | Salesforce

From connected light switches to pet feeders to RVs, the world of IoT promises a lot. For businesses, IoT offers the promise of a continually connected customer. This connectivity is a new digital channel for engagement – one which not only provides enhanced service to the customer, but also a deeper awareness of who that […]

1 2 3 4