Blog

May 17
Scattered Clouds: A Global Identity Infrastructure

Will Rose | Netflix, Inc.

It is no industry secret that Netflix moved early and earnestly to build a global streaming platform on top of Amazon’s public cloud infrastructure. It’s a lesser-known fact that this also extended to all corners of the enterprise, including our workforce and partner Identity infrastructure. A cloud-only approach to Identity infrastructure necessarily brings along expectations […]

May 16
Addressing Identity Risk Factors in the Age of “Need It Now”

Jim Ducharme | RSA

In today’s digital world, boundaries are blurring. Driven by “need it now” business demands, cloud applications are surfacing in business environments everywhere, often with little or no IT involvement. We’re allowing access to a growing and dynamic user population that includes not only employees but business partners, customers, channel partners and contractors. And, while the […]

May 15
A Primer on APIs – Opportunities, Risk, and Remediation

Jon Lehtinen | GE

APIs offer premade services, utilities, and integration points that allow applications to deliver rich features without requiring the application itself to write each component. This presents a significantly reduced barrier of complexity and time to value for application offerings both commercially, and in the enterprise. That’s said, those same integration points that extend app capability […]

April 28
In CIAM, Pay Attention to the Entry Nodes

Nishant Kaushik | Uniken

When you think of customer identity and access management (CIAM), what do you think of? One of the first things I think of is a network. That’s because I believe security teams need to map out all the different ways in which your customer interacts with you, and how they end up authenticating themselves in […]

April 27
CIS Tweet Jam Highlights

Andi Hindle | Cloud Identity Summit

Last week, we hosted the annual #cloudidsummit Tweet Jam. Identity experts were tweeting about this year’s theme of ‘Intelligent Identity’ as a preview to the conversations we expect at CIS in June. The best news of all is a special promotion that was announced during the Tweet Jam that you can use even if you […]


“Edge” Identity and Access Management

Paul Madsen | Ping Identity

The premise of “fog” or “edge computing” is that some processing of Internet of Things (IoT) device data occurs near the device rather than being communicated up to the cloud for analysis there. A key advantage for such local processing is the potential for more dynamic and timely analysis. Would you want your self-driving car […]

April 25
Fulfilling IoT’s Promise with Identity Standards

Ian Glazer | Salesforce

From connected light switches to pet feeders to RVs, the world of IoT promises a lot. For businesses, IoT offers the promise of a continually connected customer. This connectivity is a new digital channel for engagement – one which not only provides enhanced service to the customer, but also a deeper awareness of who that […]

IAM
March 30
IAM Systems Need to Become More Intelligent

David Treece

Business demands on identity and access management (IAM) infrastructure continue to grow. IAM has come a long way to improve access security and operational efficiencies. Organizations today commonly provide single sign-on, employee lifecycle management, and are extending these services to customers and consumers. Saying that, the current set of IAM tools are very prescriptive. The […]

Mobile_apps
March 29
Enabling Your Apps with Mobile SSO Just Got Easier

William Dennis | Google

Google has been working in the OpenID and IETF communities, and with identity management experts (many of who attend CIS) on best practices for native SSO using OAuth 2.0. To enable rapid adoption, we also created an open source SDK named AppAuth that implements this best practice. The AppAuth pattern is quickly being adopted within […]

March 28
Mark Your Calendars! Annual #CloudIdSummit Tweet Jam on the Horizon

Andi Hindle | Cloud Identity Summit

The Cloud Identity Summit is three months away, and the @CloudIDSummit is once again hosting the annual Tweet Jam on Wednesday, April 19th at 2pm EST. This is an hour-long Twitter event where you can get a preview of the topics and sessions coming this June in Chicago. We welcome your participation! We will be […]

Critical Authentication Standards
March 27
Why Standards are Critical for Authentication

Brett McDowell | FIDO Alliance

The need to remove our collective reliance on “shared secrets” (passwords, one-time passcodes and security questions) to enable secure user access to online services and enterprise resources has never been more clear. What is also abundantly clear: the opportunity to solve this problem in a robust, scalable manner that leverages proven public key cryptography in […]

Cloud Adoption made easier
February 22
Cloud Adoption Done Right Transforms Security Pros from Productivity Foes to Friends

Laura Hunter | Microsoft

As a long-time IT practitioner, I have seen (and contributed to!) my share of organizations whose security offices have taken a hard-line “No” approach on cloud adoption. “We can’t adopt the cloud because it’s [not secure | not secure enough | not as secure as on-prem].” I realize now that each of these organization’s security […]

1 2 3 4 5

Enter your details to receive email updates from Identiverse