Identity Fusion Blog

Is It Ethical to Cling to the Past

Written by Joseph F Miceli Jr | Apr 14, 2026 6:50:09 PM

When IAM Becomes Theater Instead of Defense

There’s a technical rot in the halls of Identity and Access Management—and it is not accidental. It is being quietly sustained. The static core of too many IAM platforms is beginning to crack and crumble, unable to bear the relentless pressure of dynamic, fast-moving threats that no longer play by yesterday’s rules. This is not the kind of failure that triggers alarms or flashes across dashboards. No, this one is more calculated. Slower by design. More dangerous because it hides in plain sight. It wears a polished smile, speaks in legacy credentials, and sells yesterday’s answers as if they were forged for tomorrow’s war.

And it is not just the technology.

Vendors and legacy implementation partners have learned how to spin a story around that decay. They wrap brittle foundations in modern language. They bolt on features and call it transformation. They lean on decades-old architectures and present them as proven, when in reality they are simply unchallenged relics. The narrative is carefully crafted to reassure, to maintain confidence, to keep the machine moving forward without forcing the hard conversation that should have happened years ago.

Because once that truth is spoken, everything changes.

We are living in a time where the threat landscape doesn’t evolve, it mutates. In real time. With teeth. With intent. Fueled by automation, by non-human identities, by agentic AI that does not sleep, does not forget, and does not wait for your quarterly patch cycle to catch up. This is not a future-state problem. It is here, now, pressing against every static assumption embedded in legacy IAM.

And yet, in the middle of this storm, there are vendors and consultants standing firm… not on solid ground, but on years of sediment. Old platforms. Old models. Old thinking. They cling to them like relics, hoping the tide won’t rise high enough to expose the truth. They reassure clients that incremental change is enough. That extensions will cover the gaps. That the core can remain untouched.

That story may be comforting, but it is also dangerous.

While the narrative holds, organizations delay the decisions that would actually protect them. They invest in preserving the past instead of preparing for what is already unfolding. They inherit risk dressed up as stability. All this while the attack surface is growing.

It will discover every weak foundation, every static assumption, every carefully constructed illusion, and your technical debt. The only question is whether your organizations will see it coming or realize it only after the damage is done.

We are living in a time where the threat landscape doesn’t evolve, it mutates. In real time. With teeth. With intent. Fueled by automation, by non-human identities, by agentic AI that does not sleep, does not forget, and does not wait for your quarterly patch cycle to catch up.

And yet, in the middle of this digital assault, vendors and consultants standing firm… not on solid ground, but on sediment. Old platforms. Old models. Old thinking. They cling to them like relics, hoping the tide won’t rise high enough to expose the truth.

It will.

The Comfortable Lie

There is a particular kind of conversation that tells you everything you need to know. You hear it when someone proudly traces their platform or skill set back twenty years, when directories were king, when roles were static, when workflows were rigid, and the world moved slower. They say it like heritage is a shield.

It isn’t.

In today’s world, where CIAM, IGA, and PAM are no longer isolated disciplines but part of a living, breathing identity ecosystem, those foundations are not just outdated. They are dangerous. Because they create the illusion of control in a world that demands adaptation. And illusion, in cybersecurity, is the most expensive mistake you can make.

The Ethics Problem No One Wants to Name

Let’s call it what it is.

If you know your technology cannot adapt to a dynamic threat environment… If you know your model requires static assumptions in a world of fluid behavior… If you know your architecture cannot respond in real time to identity-based attacks…

…and you still sell it as viable?

That’s not strategy. That’s digital IAM theater.

There is an ethical line in this industry, and too many have learned how to dance right up to it without crossing it, at least not in a way that’s easy to prosecute. They wrap old engines in new language. They bolt on orchestration and call it transformation. They rename limitations as “stability.” But deep down, they know. And so do the attackers.

The Dinosaurs Don’t Know They’re Extinct Yet

There’s an old truth about extinction, it doesn’t happen all at once. It happens slowly, a death of a thousand cuts, and then suddenly you are extinct.

The dinosaurs of IAM are still walking among us. Big logos. Long histories. Deep client lists. But their movements are slow. Their thinking, slower. They were built for a different climate, and they have not truly adapted to the one we’re in now. And the climate has changed dramatically.

Identity is no longer a gate you guard. It is the battlefield itself. Access is no longer granted. It is negotiated, moment by moment, signal by signal. Trust is no longer assumed. It is continuously proven… or revoked. In that world, static identity systems are not just obsolete. They are liabilities.

A Lesson from the Old Guard That Still Rings True

Back in the heyday of EMC Corporation, there was a mantra that cut through complacency like a blade:

“If we don’t eat our own young, someone else will.”

It wasn’t pretty. It wasn’t poetic. But it was honest. It meant this: you must be willing to obsolete your own success. To dismantle what made you great yesterday in order to survive tomorrow. To rebuild, retool, and relearn, even when it’s uncomfortable, even when it’s expensive.

Because if you don’t… someone else will do it for you. And they won’t ask permission.

The Real Cost of Pretending

When vendors pretend old tech is still viable, the cost isn’t just technical debt. It’s exposure.

It’s the orphaned identity that no one detects. It’s the AI agent operating outside the lines. It’s the stale credential that becomes the attacker’s doorway. It’s the breach that everyone says was “sophisticated,” when in reality it was inevitable. Because the system was never designed for the fight it was in.

The Way Forward: Brutal Honesty and Relentless Evolution

There is a better path, but it requires something rare in this industry: humility.

It requires admitting that IAM 2.0 thinking cannot solve IAM 3.0 problems. It requires embracing dynamic identity, runtime decisioning, and modern orchestration layers that move as fast as the threats they’re meant to stop. It requires tearing down the idea that identity is a static control plane and rebuilding it as a living system. And most of all, it requires telling the truth, to clients, to partners, and to ourselves.

What I Believe

I have always believed that integrity is not a slogan you hang on the wall, it is a discipline you live with every day. Integrity is doing the right thing even when no one is watching. It is far easier to walk a straight line than to wander through a maze of half-truths and rehearsed explanations, trying to remember which version of the story you told to whom. Honesty has a way of simplifying life. Lies, on the other hand, compound like bad debt. They grow, they entangle, and eventually they collapse under their own weight.

In cybersecurity and IAM, that difference matters more than most care to admit.

I have sat across from too many conversations where the story sounds polished, the slides are clean, and the message is carefully engineered to avoid one simple thing, the truth. The old IAM guard, for all its supposed experience and history, too often leans on narrative instead of reality. They speak in terms of what their platforms were built to do, not what they can actually handle today. They reference lineage as if it were proof of relevance. And somewhere in that performance, the client is left believing they are protected, when in fact they are exposed.

That is where it falls short for me.

Because integrity, in IAM, is not theoretical. It is operational. It shows up in the moment when you have to tell a client something they may not want to hear. It shows up when you point out that the foundation they are standing on has cracks in it, cracks that no amount of marketing or technical smokescreen language can seal. It shows up when you resist the easy path of agreement and instead choose the harder path of truth.

I will tell a client where the shortcomings are. Plainly. Without dressing it up. Not to create fear, but to create clarity. Because only when the truth is on the table can we make the right decision, whether that is to fix what exists, modernize it, or walk away and choose a different path entirely.

That is the difference between being just a vendor or implementor and being a trusted advisor, and the line between the two is clearer than most care to admit. It takes discipline to deliver truth.

And in a world where identity is the front line of defense, truth is not just a virtue, it is a moral imperative.