Sounded simple enough. Join forces with Pam and Dale to put on a 3 hour workshop at the Cloud Identity Summit exploring all things identity management, each of us having a whole hour in which to dazzle the crowd. And with an awesome theme like the Hitchhikers Guide to help us keep it entertaining. This was bound to
That is the position is set out to convince people of with my talk ‘IDaaS: The Now Big Thing‘ at this years Cloud Identity Summit. Even with the words ‘Cloud’ and ‘Identity’ in the name of the conference, and even with a fairly friendly crowd, I knew that this would be a somewhat daunting challenge.
Another Cloud Identity Summit is in the books, and it confirmed its status as one of the premier conferences for all things identity management. Andre and the Ping Identity team did a great job as always, and Napa was a great location (though connectivity did become an issue). Most importantly, Mark and Pam did a
What happens when you take a bunch of technologists interested in identity, cloud computing, mobile and the evolution of IT and whisk them away to a resort in wine country? Well, we will get a chance to find out next week at the Cloud Identity Summit that is taking place in Napa, CA. Through workshops,
As this Joy of Tech cartoon demonstrates, PRISM seems to have solved that problem for us. All that’s left to do is slap a RESTful Web Service on that data source. Should it be SAML or SCIM? This is pretty much the epitome of “It’s funny because it’s true”. The way that “metadata” can be
“It’s a mystery. Broken into a jigsaw puzzle. Wrapped in a conundrum. Hidden in a Chinese box. A riddle.” – The Riddler, The Long Halloween Yesterday’s hack of the AP’s Twitter account was big. Not only did the impact it had on the stock market prove Ranjeet’s thesis that Twitter is now a SOX (Sarbanes-Oxley)
‘Tis the season to be hacked, I guess. Twitter joined a bunch of other companies in revealing that it was the target of a sophisticated attack that may have exposed the information for about 250,000 users. While the data that was allegedly exposed, including encrypted/salted versions of passwords, was not as bad as in some
I’m just now coming back to earth from the high I’ve been on since I came back from Vegas on Wednesday. And no, it has nothing to do with the usual things you’d associate with Sin City. I was in Vegas for our company’s bi-annual all-hands meeting. We’ve grown tremendously since I started at Identropy
Last week I was in Colorado for the Defrag and Blur conferences. Defrag bills itself as ‘the premiere thought leader discussions about “what’s coming next” in technology’. And it certainly lived up to the billing, as I attended some great talks from folks like Paul Kedrosky, Jeff Ma, Ray Wang, Jay Simons and Jeff Lawson.
If you’ve been following Authentication related discussions, you know that a lot of the tactical focus is on adding additional authentication factors to the base username/password login mechanism as a way of making it more secure. This is particularly true in consumer facing applications, as brought into stark contrast by the Mat Honan hack episode.