Bill Nelson

Who’s Really Making Healthcare Decisions? The Hidden Dangers of Not Verifying Proxies

In today’s healthcare landscape, the role of proxies—whether they are caregivers, powers of attorney (POA), or other designated representatives—is more vital than ever. These..

Read More

The Critical Need for Modern Identity Proofing in Healthcare

As healthcare increasingly embraces digital transformation, the need for robust identity proofing has never been more critical. Identity proofing is the process of verifying that..

Read More

The Growing Threat of Deepfakes to Remote Identity Verification

As our reliance on digital services grows, remote identity verification systems have become a critical part of securing online interactions. However, the advent of..

Read More

The Importance of Just-in-Time Access in Privileged Access Management

In today’s interconnected and data-centric world, organizations face escalating threats to their critical systems and sensitive data. Privileged accounts, with their elevated..

Read More

Enhancing Security with Zero Standing Privileges and Identity Governance

In today’s digital landscape, managing access to sensitive systems and data is paramount for maintaining security and compliance. Two pivotal concepts that address these..

Read More

The Power of Bring Your Own Identity (BYOI)

Introduction In today's interconnected digital landscape, the way we perceive and manage our identities has undergone a significant transformation. Gone are the days when our..

Read More

In Pursuit of Trust: Exceeding Expectations in Project Delivery

Introduction We have recently concluded a project involving the migration of a major global provider of managed cloud computing services from CA Directory to a modern and more..

Read More

How do you Implement IAM? One Bite at a Time

How do you Implement IAM? One Bite at a Time

Introduction Oftentimes, tasks can seem daunting when you focus on the big picture and IAM implementations are no different. Successful IAM projects take a gradual, methodical..

Read More

Designing for Resiliency

On Tues, Dec 7th, Amazon suffered one of the largest outages in recent years as both businesses and consumers were impacted for more than 5 hours. Lines were backed up at the..

Read More

security alert neon sign with padlock

Identity Fusion Responds to Directory Services (OpenDJ) Security Advisory #201703

ForgeRock released Security Advisory #201703 covering two medium security vulnerabilities for Directory Services (OpenDJ) impacting versions 2.6 on up to 3.5.1 as well as the..

Read More

OpenIDM Property Value Substitution

Property value substitution can be a useful technique for customizing OpenIDM deployments across multiple environments.

Read More