IdM and the Cloud: A Chance To Do Things Right

Over 2 months ago (wow, time really flies when you are trying to keep up with the Twitter firehose), I wrote an introductory post to a topic that I am beginning to examine in some detail – the impact Cloud Computing will have on Identity Management. Back in May, I tweeted that I believe cloud

Burton Catalyst 2009: There are Lessons to Learn

After a good start to the conference, I went into day 2 thinking that there was going to be more opportunity for me to blog while in the session room because the content would be fairly familiar. But there were lots of good nuggets of information spread throughout the talks, enough to generate a generous

Burton Catalyst 2009: Waiting for the World to Change

In my last post, I talked about the SIG meetings that I attended prior to the conference actually starting. There was lots of good content and discussion, which continued on into the actual sessions. I had thought of splitting my time between the Identity and Cloud Computing (new to Catalyst this year) tracks. But the

Burton Catalyst 2009: The Twisted Web We Weave

I’m finally settling back into work after a wonderful week out in sunny San Diego at Burton Group‘s annual Catalyst Conference. And it wasn’t just the weather outside that was wonderful. Inside you could find some thought-provoking sessions, inspiring discussions and great people. It’s given me way too much to blog about, and I hope

The Twitter Break-In: Anything to learn here?

The answer is: Plenty. In a nutshell, here is what happened as I understand it: A hacker named Hacker Croll (who has been a pain in Twitter’s behind for a while now) was able to gain access to the Gmail accounts of various twitter employees, including founder Evan Williams. He was then able to use

Identity Proofing on Twitter – problems and potential

All the web has been abuzz recently about Twitters launch of Verified Accounts (read Mashable’s post about it here). The goal of the program is to be able to show a badge on a Twitter account that communicates to readers the authenticity of the twitter stream. The reason for Twitter doing this is to avoid

Now How Are We Supposed To Solve This?

Here is an interesting anecdote I heard yesterday (identity of person withheld for their own protection): My tween daughter was entering some sort of online popularity contest. It involved registering yourself as a contestant online with your email address, and then verifying your entry by clicking on a link in a verification email you would

Entitlement Management: More than meets the eye

Ian Yip just blogged his thoughts about what Entitlement Management means. It’s interesting to hear his take, because not too long ago, I participated in another discussion that was trying to define EM. Back then, the contention was that entitlement management and RBAC were essentially solutions to the same problem, setting off a “which one