For years clients have been told the same comforting story about identity platforms by the vendors. Buy the platform. Deploy the fabric. Integrate the applications. Patch it..
Every industry reaches moments when the ground shifts so completely that the old maps become liabilities. Identity and Access Management is standing squarely in one of those..
I may be a broken record because I keep pointing out that the attack surface has evolved.
Why identity has always been infrastructure, and always the defense...
For most of my career, I have watched talented sales professionals lose deals they had every right to win.
Every industry reaches moments when the ground shifts so completely that the old maps become liabilities. Identity and Access Management is standing squarely in one of those..
Healthcare has always understood risk. Long before “cyber” entered the vocabulary, clinicians learned to respect infection control, chain of custody, redundancy, and fail-safe..
For years, organizations treated identity like a lock on a door. Authenticate the user, check the box, all’s good, move on. That model made sense when identities were mostly..
When I saw these headlines the first thing I did was look for a credible news source, I didn't find one. The rumor of a $610 billion AI Ponzi scheme didn’t surprise me; these..
The modern network hums with voices you can't see. Not people, machines. Containers, APIs, CI/CD agents, cloud functions, service accounts, scheduled jobs, and AI agents: an..
INSIGHT SERIES 2 of 4 This article is the second chapter of a four-part series. The clock is ticking on legacy IAM. The “old guard” wasn’t built for AI, bots, APIs, or non-human..
INSIGHT SERIES 1 of 4 This article marks the opening chapter of a four-part series on the death of IAM’s so-called “best practices.” For too long, vendors have offered patches and..