Identity Fusion Blog: IAM

Analysts, Oracles, and the $80,000 Bake Sale

Walking out of the identity conference in Texas feels a bit like leaving a Renaissance fair where everyone forgot their costumes but kept the ticket prices. Vendors pulled me..

Read More

A 610 Billion Dollar Ponzi Scheme?

When I saw these headlines the first thing I did was look for a credible news source, I didn't find one. The rumor of a $610 billion AI Ponzi scheme didn’t surprise me; these..

Read More

Thales Industry Leadership with New FIDO Biometric Security Key

As digital transformation continues to blur the boundaries between cloud and on-premises infrastructure, one truth stands firm: identity is now the front line of defense. Thales,..

Read More

The Invisible Perimeter

Business today doesn’t end at the corporate firewall. Financial institutions, insurers, manufacturers, and service providers now operate in a mesh of partnerships, agents,..

Read More

Who Blew Up Your Attack Surface?

The modern network hums with voices you can't see. Not people, machines. Containers, APIs, CI/CD agents, cloud functions, service accounts, scheduled jobs, and AI agents: an..

Read More

The Silent Revolution

INSIGHT SERIES 2 of 4 This article is the second chapter of a four-part series. The clock is ticking on legacy IAM. The “old guard” wasn’t built for AI, bots, APIs, or non-human..

Read More

The Death of the Old Guard: Why Todays Identity and Access Management Can't Survive the AI Age

INSIGHT SERIES 1 of 4 This article marks the opening chapter of a four-part series on the death of IAM’s so-called “best practices.” For too long, vendors have offered patches and..

Read More

Breach Detection Takes Too Long: Why Even “New” IAM Systems Need Modernization

IBM’s research lays it bare: it takes 292 days on average to detect a compromised non-human identity (NHI). That’s nearly 10 months, an eternity in the digital battlefield. By..

Read More

The Genius Behind Security

I often write about the challenges that define cybersecurity today, the relentless push and pull between defenders and attackers, the fragile balance between Identity and Access..

Read More

The New Blind Spot in IAM: Why Non- Human Identities Are Quietly Undermining Your Cybersecurity Investment

In most boardrooms, when identity security is mentioned, the focus defaults to people, employees, contractors, and customers. But in today’s digital enterprise, the biggest..

Read More