• Blog
  • Talks and Presentations
  • Whitepapers and more
  • In The News
  • About Talking Identity
  • About Me

Where does User-Centric Identity fit into the Enterprise?

  • Posted on:June 14, 2006
  • Posted in:User-Centric Identity
  • Posted by:Nishant Kaushik
0

One area that I have been paying a lot of attention to recently is the scaldingly hot area of user-centric identity. No other area in identity management is generating as much interest in the community. While this is extremely gratifying (because the ultimate goal is to make our lives better and more secure, and who…

Read More
Tags: Enterprise IdentityUser-Centric Identity

Catalyst is the place to be if you care about Identity

  • Posted on:June 13, 2006
  • Posted in:Insight IdM
  • Posted by:Nishant Kaushik
0

Burton Group’s Catalyst Conference is one of the biggest technology events in North America, and is being held in San Francisco this week. If you care about Identity, it is one of the premier conferences to attend, because the conference usually fosters some really in-depth discussions into topics that are at the forefront of the…

Read More
Tags: Burton Catalyst Conference

Phil Becker identifies the top 5 Identity Fallacies

  • Posted on:June 13, 2006
  • Posted in:Insight IdM
  • Posted by:Nishant Kaushik
0

Phil Becker has written an interesting series of articles about the top 5 fallacies which appear and reappear in identity discussions, technologies and deployments. It makes for pretty interesting reading, so check it out at the Digital ID World Blogs. I wanted to comment on fallacy #3: Centralized Management Means Centralized Data. In his article,…

Read More
Tags: Digital ID WorldIdentity Fallacies

Defining Role Management – Part 2

  • Posted on:June 7, 2006
  • Posted in:Insight IdM
  • Posted by:Nishant Kaushik
0

In part 1 of this multi-post blog, I laid out what I believe are the various disciplines that make up a complete role management solution. In this post, I will tackle the more contentious discipline – that of role definition. Fundamentally, two camps have evolved around different approaches to the problem of defining roles. There…

Read More
Tags: Role Management

Reading the Information Security Breaches Survey

  • Posted on:June 2, 2006
  • Posted in:Insight IdM
  • Posted by:Nishant Kaushik
0

PwC recently published the “Information Security Breaches Survey 2006” report, sponsored by the Department of Trade and Industry (DTI) in the UK. The 8th such survey is aimed at raising awareness among UK businesses of the risks they face in the internet age. Below are some highlights from my quick read through it, and some…

Read More
Tags: Information SecuritySecurity

Recent Posts

Securing Our Biometrics-Based Future
The last few years have seen an uptick in efforts to use biometr...
My Next Gig: Delivering the Identity-Defined Perimeter with Uniken
Back in 2013, I opened my 'Hitchhikers Guide to Identity' talk w...
Invisible Identity, or How to Delight People & Secure Users
So I waited patiently for the folks at the Cloud Identity Summit...
Doing 2FA Better Could Mean Using Social Factors
In my last post regarding weaknesses in how 2FA is implemented i...
Doing 2FA Correctly Requires More Than 2 Factors
Two Factor Authentication (or 2FA) has been in the news a lo...

Recent Comments

Talking Identity | Nishant Kaushik's Look at the World of Identity ManagementHow Not To Enhance Your Customers Security - Talking Identity | Nishant Kaushik's Look at the World of Identity Management on
The Epic Hacking of Mat Honan and Our Identity Challenge
112 weeks ago

Talking Identity | Nishant Kaushik's Look at the World of Identity ManagementHow Not To Enhance Your Customers Security - Talking Identity | Nishant Kaushik's Look at the World of Identity Management on
#FAIL No More: The Rise of the Self Defending Enterprise
112 weeks ago

NishantKaushik on
That Time Enabling Two-Factor Authentication Made Me Feel Worse
114 weeks ago

Gabor Szathmari on
That Time Enabling Two-Factor Authentication Made Me Feel Worse
114 weeks ago

UK Access Management Focus · Reputation is everything on
The new Identity Equation
127 weeks ago

What I’m Blogging About

Connect

Twitter Follow @NishantK

LinkedIn Connect on LinkedIn

Vimeo View Nishant's Talks

About Me nishantkaushik.com

Categories

  • Ask Dr. K (12)
  • Identity Services (36)
  • Identropy IDaaS (4)
  • Insight IdM (149)
  • Oracle Identity Management (61)
  • Personal Identity Management (33)
  • The Cloud Identity Series (24)
  • Tips & Techniques (4)
  • User-Centric Identity (24)

Archives

  • ► 2018 (1)
    • January 2018 (1)
  • ► 2017 (1)
    • April 2017 (1)
  • ► 2016 (9)
    • December 2016 (1)
    • October 2016 (1)
    • August 2016 (1)
    • June 2016 (4)
    • February 2016 (2)
  • ► 2015 (5)
    • November 2015 (1)
    • June 2015 (2)
    • April 2015 (1)
    • February 2015 (1)
  • ► 2014 (8)
    • October 2014 (1)
    • September 2014 (2)
    • August 2014 (1)
    • July 2014 (1)
    • June 2014 (1)
    • February 2014 (2)
  • ► 2013 (12)
    • December 2013 (1)
    • August 2013 (2)
    • July 2013 (5)
    • June 2013 (1)
    • April 2013 (1)
    • February 2013 (1)
    • January 2013 (1)
  • ► 2012 (13)
    • November 2012 (2)
    • August 2012 (3)
    • July 2012 (2)
    • June 2012 (2)
    • May 2012 (1)
    • February 2012 (3)
  • ► 2011 (29)
    • December 2011 (1)
    • November 2011 (1)
    • October 2011 (1)
    • September 2011 (2)
    • August 2011 (3)
    • July 2011 (4)
    • June 2011 (5)
    • May 2011 (3)
    • April 2011 (4)
    • February 2011 (2)
    • January 2011 (3)
  • ► 2010 (33)
    • December 2010 (1)
    • October 2010 (1)
    • September 2010 (4)
    • August 2010 (5)
    • July 2010 (6)
    • June 2010 (4)
    • May 2010 (3)
    • April 2010 (2)
    • March 2010 (3)
    • February 2010 (2)
    • January 2010 (2)
  • ► 2009 (24)
    • December 2009 (1)
    • November 2009 (1)
    • October 2009 (3)
    • September 2009 (3)
    • August 2009 (4)
    • July 2009 (2)
    • June 2009 (2)
    • May 2009 (3)
    • April 2009 (1)
    • February 2009 (2)
    • January 2009 (2)
  • ► 2008 (44)
    • December 2008 (1)
    • October 2008 (4)
    • September 2008 (4)
    • August 2008 (8)
    • July 2008 (11)
    • June 2008 (4)
    • May 2008 (2)
    • April 2008 (2)
    • March 2008 (3)
    • February 2008 (3)
    • January 2008 (2)
  • ► 2007 (56)
    • December 2007 (3)
    • November 2007 (5)
    • October 2007 (6)
    • September 2007 (5)
    • August 2007 (8)
    • July 2007 (5)
    • June 2007 (9)
    • May 2007 (3)
    • April 2007 (2)
    • March 2007 (5)
    • February 2007 (5)
  • ► 2006 (33)
    • December 2006 (4)
    • November 2006 (2)
    • October 2006 (6)
    • September 2006 (1)
    • August 2006 (2)
    • July 2006 (3)
    • June 2006 (5)
    • May 2006 (3)
    • April 2006 (2)
    • March 2006 (5)

Disclaimer

Talking Identity is my exploration of the world of Identity Management. The views expressed on this blog are my own and do not necessarily reflect the views of my employer (doesn't mean I'm not trying hard to mold them in my own image).

Copyright © 2005-2013 Nishant Kaushik. All Rights Reserved.