‘Tis the season to be hacked, I guess. Twitter joined a bunch of other companies in revealing that it was the target of a sophisticated attack that may have exposed the information for about 250,000 users. While the data that was allegedly exposed, including encrypted/salted versions of passwords, was not as bad as in some
I’m just now coming back to earth from the high I’ve been on since I came back from Vegas on Wednesday. And no, it has nothing to do with the usual things you’d associate with Sin City. I was in Vegas for our company’s bi-annual all-hands meeting. We’ve grown tremendously since I started at Identropy
Last week I was in Colorado for the Defrag and Blur conferences. Defrag bills itself as ‘the premiere thought leader discussions about “what’s coming next” in technology’. And it certainly lived up to the billing, as I attended some great talks from folks like Paul Kedrosky, Jeff Ma, Ray Wang, Jay Simons and Jeff Lawson.
If you’ve been following Authentication related discussions, you know that a lot of the tactical focus is on adding additional authentication factors to the base username/password login mechanism as a way of making it more secure. This is particularly true in consumer facing applications, as brought into stark contrast by the Mat Honan hack episode.
Another year, and another Catalyst conference had come and gone. This one was very different. For one, the structure of the conference is very different from years past, focusing on thematic areas rather than topics of research. As such, there was no focused identity track, but rather a sprinkling of identity management topics throughout the
Wired has the kind of article that will make all of us leading highly digitized lives (is that the right term?) wake up in a cold sweat. While the title – How Apple and Amazon Security Flaws Led to My Epic Hacking – may strike many as sensationalist, the article does a good job of
While the identity community is consumed by the “SAML is a Zombie” and “OAuth is Evil” debates, I wanted to go back to a slightly older topic of discussion. Almost 2 months ago (my, how time flies when protocols are being given the business), I wrote about Windows Azure AD and the necessity to understand
There’s no two ways about it. This year’s Cloud Identity Summit was another incredible edition that brought together great content and really interesting discussions about the state and future of identity. It is definitely going to be fun watching the amazing community we have in identity use this conference as a platform to make a
It’s Cloud Identity Summit week, and it should be a blast. For one, it’s in beautiful Vail, CO – a place I’ve never been to. Secondly, you never know what will happen when you put all the identity oddballs in the same place, with no place to escape to. But mostly, there should be lots
In a post entitled “Freedom of Choice ≠ Your Choice of Captor“, Craig Burton has responded to the part of my previous post where I expressed skepticism about the “profound innovation” in the work Microsoft is doing. I want to be clear: I am not questioning the vision that Kim Cameron has started to talk