Identity Fusion Corporate Blogs & Articles
Walking out of the identity conference in Texas feels a bit like leaving a Renaissance fair where everyone forgot their costumes but kept the ticket prices. Vendors pulled me..
Why Continuous Authentication Must Protect Both the User and the Application
When I saw these headlines the first thing I did was look for a credible news source, I didn't find one. The rumor of a $610 billion AI Ponzi scheme didn’t surprise me; these..
Early lessons from the Cloudflare Outage of November 18, 2025:
As digital transformation continues to blur the boundaries between cloud and on-premises infrastructure, one truth stands firm: identity is now the front line of defense. Thales,..
Business today doesn’t end at the corporate firewall. Financial institutions, insurers, manufacturers, and service providers now operate in a mesh of partnerships, agents,..
The modern network hums with voices you can't see. Not people, machines. Containers, APIs, CI/CD agents, cloud functions, service accounts, scheduled jobs, and AI agents: an..
The AWS East region outage on October 20th, 2025, was more than a technical hiccup, it was a reality check. For years, cloud evangelists have sung the praises of “always on”..
INSIGHT SERIES 4 of 4 Legacy IAM is now the weakest link in the enterprise chain. The “users” in your systems aren’t human at all, they’re APIs, bots, service accounts and the..
INSIGHT SERIES 3 of 4 This article is the third chapter in our four-part series on the end of legacy IAM and the rise of IAM 3.0. The cracks in the old platform fortress are no..
INSIGHT SERIES 2 of 4 This article is the second chapter of a four-part series. The clock is ticking on legacy IAM. The “old guard” wasn’t built for AI, bots, APIs, or non-human..
INSIGHT SERIES 1 of 4 This article marks the opening chapter of a four-part series on the death of IAM’s so-called “best practices.” For too long, vendors have offered patches and..