Last week I was in Colorado for the Defrag and Blur conferences. Defrag bills itself as ‘the premiere thought leader discussions about “what’s coming next” in technology’. And it certainly lived up to the billing, as I attended some great talks from folks like Paul Kedrosky, Jeff Ma, Ray Wang, Jay Simons and Jeff Lawson.
If you’ve been following Authentication related discussions, you know that a lot of the tactical focus is on adding additional authentication factors to the base username/password login mechanism as a way of making it more secure. This is particularly true in consumer facing applications, as brought into stark contrast by the Mat Honan hack episode.
Another year, and another Catalyst conference had come and gone. This one was very different. For one, the structure of the conference is very different from years past, focusing on thematic areas rather than topics of research. As such, there was no focused identity track, but rather a sprinkling of identity management topics throughout the
Wired has the kind of article that will make all of us leading highly digitized lives (is that the right term?) wake up in a cold sweat. While the title – How Apple and Amazon Security Flaws Led to My Epic Hacking – may strike many as sensationalist, the article does a good job of
While the identity community is consumed by the “SAML is a Zombie” and “OAuth is Evil” debates, I wanted to go back to a slightly older topic of discussion. Almost 2 months ago (my, how time flies when protocols are being given the business), I wrote about Windows Azure AD and the necessity to understand
There’s no two ways about it. This year’s Cloud Identity Summit was another incredible edition that brought together great content and really interesting discussions about the state and future of identity. It is definitely going to be fun watching the amazing community we have in identity use this conference as a platform to make a
It’s Cloud Identity Summit week, and it should be a blast. For one, it’s in beautiful Vail, CO – a place I’ve never been to. Secondly, you never know what will happen when you put all the identity oddballs in the same place, with no place to escape to. But mostly, there should be lots
In a post entitled “Freedom of Choice ≠ Your Choice of Captor“, Craig Burton has responded to the part of my previous post where I expressed skepticism about the “profound innovation” in the work Microsoft is doing. I want to be clear: I am not questioning the vision that Kim Cameron has started to talk
Kim Cameron has a vision for where identity management is going, and he has started to lay it out in a series of blog posts, starting with this post on ‘Identity Management as a Service‘ (where he unfortunately reopened the IDaaS vs IDMaaS acronym debate). I think most of us would agree with his statement
What does it take to wake me from my blogging slumber? I guess it takes someone bashing Identity Management as a security technology that is deployed just for the sake of it. In an article today on InfoWorld entitled ‘Killing the cloud with complexity‘, David Linthicum classifies Identity Management as a “trendy”, “newer” and “more