Archive/category: Identity Management

The Next Generation of Identity Management

The face of identity is changing. Historically, it was the duty of an identity management solution to manage and control an individual’s access to corporate resources. Such solutions worked well as long as the identity was safe behind the corporate firewall – and the resources were owned by the organization. But in today’s world of Read more

Trust – The Missing Ingredient

I was having a conversation with friends the other day and while it may sound nerdy as hell, the topic was focused on identity.  I swear (trust me) that no drinks were involved but the conversation went pretty deep, nonetheless.  What is identity, how is it used, and how can it be protected?  Like Aristotle Read more

Is Your Intellectual Property Slipping Out the Door with Their Pink Slip?

(I wrote the following article for BABM Business Magazine back in May/June of 2009. The article is reprinted here with their permission.) With the latest layoff news continuing to add chaos to the economy, CEOs need to protect their businesses in case of staff cuts, restructuring or consolidation of offices. While your company may not Read more

Advice to CIOs for High Exposure Projects

I read an article in CIO Magazine about the plight of today’s CIOs when multi-million dollar multi-year projects go awry. The article entitled “The CIO Scapegoat” indicates that it is unfair to hold the IT department completely responsible when there are so many other business units that contribute to a project’s demise. In many cases, Read more

Opinions About the Federal Government’s Identity Initiative

Interesting read. This is essentially a WebSSO initiative with authentication based on CAC type ID cards or OpenID. The CAC type of implementation (ID Cards) are not practical as they require everyone to have a card reader on their PC in order to do business with the government. I don’t see this happening anytime too Read more

Identity Management Lessons from Sarah Palin

By now, many of you have already heard about the hacking of Alaska Governor Sarah Palin’s Yahoo e-mail account earlier this week (on or about Tuesday 9/16/2008). If not, here is a brief synopsys of the story. Sarah Palin’s personal Yahoo e-mail account was compromised and the contents of her account (including her address book, Read more

Lessons Learned from Enterprise Identity Management Projects

I have been implementing and/or managing identity-related projects for over 10 years now and I can say, from experience, that the biggest problem with any Identity Management project can be summed up in one word: EXPECTATIONS. It does not matter whether you are tackling an identity project for compliance, security or cost-reduction reasons. You need Read more