This is a little bit of a rant, but read this article in the New York Times and you may understand why. It is difficult to get past the feelings of disbelief, outrage and anger that the tragic story of Megan Meier will stir inside you. But if you somehow manage to move past it
It feels good to come to any conference and hear people talk about concepts and trends that validate the direction we are taking. And the Gartner IAM Summit certainly did that. Steps that we are making in the areas of role management, identity services and the move towards tighter integration of identity into the fabric
Last week I commented on Dan Nye’s apparent lack of understanding about the need for a social graph for the web. This week, I read the following comment by Mark Zuckerberg, founder and chief executive of Facebook, on how he defines the social graph: “When we talk about the social graph we are talking about
Yesterday I talked about the NYT article on personal identity management, and alluded to the discussion it generated on the nature of the Identity Oracle that Burton’s Bob Blakely introduced a while ago. The Identity Oracle concept is at the heart of any L.L.P based identity infrastructure. Kim Cameron read the article and the following
You know you are at a good conference any time your keynote address throws up a picture of Neo (from The Matrix) on the screen. That’s exactly what Doc Searls did during a typically humorous and thought-provoking keynote roughly titled “The Decentralization of Identity” (actually re-titled in real time based on Phil Becker’s opening keynote)
In his Network World on Security newsletter this week, Dave Kearns talks about a new kind of password management product that seems to be picking up traction. Lieberman Software’s Random Password Manager offers interesting new capabilities in password management similar to Cyber-Ark’s Enterprise Password Vault (EPV). I had briefly mentioned Cyber-Ark in a blog post
The folks over at Securent are onto a good thing with the community driven blog they started called simply the Entitlement Management blog. They have managed to get posts from an impressive set of contributors, including Burton’s Gerry Gebel and Forrester’s Andras Cser. Check it out when you get a chance. What caught my eye
You can read here an interesting interview eWeek ran of Burton Group analyst Mark Diodati on the topic of Identity Proofing – that crucial but often tricky process that verifies that someone is indeed who they are claiming to be. This is somewhat different from authentication, which is the process of someone identifying themselves to
I read this post on the Wired blogs about an ATM heist in which the culprit re-programmed the ATM to think it was dispensing dollar bills when it was actually dispensing twenties, thereby allowing the guy to clean out the ATM. How did he do the re-programming? Because he knew the Master Passcode for the
Catalyst 2007 has been a good conference for me simply because of the intangibles – Good conversations, stimulating discussions, and loads of fun. Here is a wrap up of a hodge-podge of thoughts from the conference. Identity Services, Where Art Thou?The second half of day 2 was dedicated to the subject of identity services. While