My colleague Jeff Shukis, who used to be VP of Engineering and Operations at Bridgestream, has started a blog of his own to talk about identity management, role management in particular. In his first post, he has started a deeper dive into the shortcomings of the NIST RBAC standard, an issue that I raised a
Ian Glazer thinks that I have opened Pandora’s box by talking about the need to bring context and intent into the area of RBAC by using relationships (one of many ways to express context). I think it’s a topic ripe for some discussion, so I’m glad to be the one taking the lid off. Mat
Well, I think I am done talking about directories now, especially after reading Ian Yip’s hilarious recap of the debate, as it were. Having now appeared as a significant bit player in this drama, I have decided to leave it in the hands of more capable people like Clayton and am moving on to familiar
The folks over at Securent are onto a good thing with the community driven blog they started called simply the Entitlement Management blog. They have managed to get posts from an impressive set of contributors, including Burton’s Gerry Gebel and Forrester’s Andras Cser. Check it out when you get a chance. What caught my eye
I attended a very informative session entitled “Enterprise IAM Challenges – A Practical Approach to RBAC” given by Jeff Bardin, the CISO at Investors Bank and Trust. It was a frank, open account of his experience leading a team on an IAM project that took his previous employer from a failed audit to a successful