Another year, another European Identity Award for an Oracle customer. At last weeks European Identity Conference, KuppingerCole gave their coveted award in the Governance, Risk Management and Compliance category to BT for their Managed Fraud Reduction service. The BT MFR service provides a real time risk assessment of online transactions, thus providing customers the ability
With the Sun acquisition complete, we can finally start talking about what this means for various product lines. Thomas Kurian touched on the identity management strategy in the big Wednesday launch event, and I recapped what he said in my previous blog post. Now, the next level of detail has come from Hasan Rizvi, SVP
Well, it’s finally here. After months and months of delay, Oracle announced it finalized its acquisition of Sun. It took so long, I think of lot of people thought this day was just a mirage. And unfortunately, the delay has cost us (in the identity management team) the opportunity to work with some great folks
On Monday, I presented at Oracle OpenWorld on the topic of “Identity Management and the Cloud: Stormy Days Ahead?“. The title proved to be a little too prescient, because the weather in San Francisco was pretty nasty. And as you can imagine, the number of jokes made about this became all to predictable. Unfortunate coincidences
A few weeks ago, while I was at Catalyst, I read an article about the marines banning the use of social media. The policy on social media usage is far from consistent within our armed forces, as revealed in this Stars and Stripes story that shows just how confused and divided the policy makers are:
I’m finally settling back into work after a wonderful week out in sunny San Diego at Burton Group‘s annual Catalyst Conference. And it wasn’t just the weather outside that was wonderful. Inside you could find some thought-provoking sessions, inspiring discussions and great people. It’s given me way too much to blog about, and I hope
The answer is: Plenty. In a nutshell, here is what happened as I understand it: A hacker named Hacker Croll (who has been a pain in Twitter’s behind for a while now) was able to gain access to the Gmail accounts of various twitter employees, including founder Evan Williams. He was then able to use
This is the introductory post in a series I hope to write regarding Identity Management and Cloud Computing, leading up to a talk I will be giving at Oracle OpenWorld on the topic (details to come). But before we dive into the topic, I do need to lay some groundwork around some relevant concepts. What
Ian Yip just blogged his thoughts about what Entitlement Management means. It’s interesting to hear his take, because not too long ago, I participated in another discussion that was trying to define EM. Back then, the contention was that entitlement management and RBAC were essentially solutions to the same problem, setting off a “which one