The answer is: Plenty. In a nutshell, here is what happened as I understand it: A hacker named Hacker Croll (who has been a pain in Twitter’s behind for a while now) was able to gain access to the Gmail accounts of various twitter employees, including founder Evan Williams. He was then able to use
I know I’ve been quiet for a while. In large part, I lay the blame at the doorstep of the almighty Twitter. It made it too easy for me to get my thoughts out there without having to put too much effort into it 🙂 But it is partly also because I have been working
Privacy advocates have long been raising a hue and cry about the negative impact social networking sites are having on privacy. For the most part, the glare has been on the poor security practices and privacy controls of these sites. But now researchers at the University of Texas at Austin have brought to light a
My previous post on federated provisioning generated some interesting responses, both in the comments and in the blogosphere (see responses from Ian, Pamela and Pat Patterson). The topic has been so engaging (starting with Jackson Shaw’s post) that while I was writing this post I saw that Dave Kearns has made it the topic for
Ian Glazer recently blogged about federated provisioning, saying “Federated provisioning should not exist; there is only provisioning.”. Well, I think he’s both right and wrong about this. Let me explain. Suppose two companies, Acme and Omega enter into a federation agreement, whereby employees of Acme will be able to access a service at Omega using
Wednesday, January 28 is International Data Privacy Day, honoring the anniversary of the Council of Europe Convention on Data Protection (No. 108), the most important international law for privacy. The purpose of this convention is to secure in the territory of each Party for every individual, whatever his nationality or residence, respect for his rights
It’s been a long time since I have been able to post. A lot conspired to make it difficult for me to keep up with my blogging, not the least of which has been a number of interesting, but under wrap, developments within the IdM group at Oracle (if you follow me on Twitter, you
One of the big buzzwords this past month or so has been “Identity Assurance“. Liberty Alliance made a big push for the Identity Assurance Framework (IAF)at DIDW last month, conducting a number of sessions/workshops introducing it to the masses. Our old friend Frank Villavicencio, who is a co-chair of the IAEG, was a star at
My Digital ID World was all about conversations. Much more useful to me than the sessions was the opportunity to brainstorm with some very smart, very committed (some insanely so) people in the identity community. The sessions were good, and some managed to inspire some original thought. But the hallway conversations (so to speak) were
This week I was invited to join Brenda Hughes from Cisco on next weeks DIDW panel discussing “Lessons learned from Successful Compliance Deployments“. My hope is to share some of the insight I obtained from watching (at uncomfortably close quarters, from a vendor perspective) a number of our customers go through the process of deploying