I was trying really hard to focus on the technical aspect of identity, but today, you need to let me talk just a little bit.…
View More Trust vs Authority in Access Recovery ProceduresCategory: Cyber security
Risk Based Authentication 101
I have mentioned Risk Based Authentication (RBA) in the past in my MFA blog, but the technology is getting traction and more and more vendors…
View More Risk Based Authentication 101Perimeter Risk in Zero Trust Model
Zero Trust Model means that no matter who you are or where you’re coming from, you should undergo the same scrutiny from the security perspective.…
View More Perimeter Risk in Zero Trust ModelPantha Rhei and nothing is immutable, including the 10 Immutable Laws of Security
One of the first things I laid my eyes on when I decided to become a security professional years ago, was Microsoft Technet’s 10 Immutable…
View More Pantha Rhei and nothing is immutable, including the 10 Immutable Laws of SecurityIAM Managed Service
What is an IAM Managed Service? Businesses are under pressure to increase agility which in turn increases IT complexity. IAM managed services help seamlessly manage…
View More IAM Managed ServiceMy-T-Factor. Deep dive into security of factors used in MFA.
Most if not all heard about MFA (Multi-Factor Authentication), but on at least a few occasions I came across heated debates around the actual strength…
View More My-T-Factor. Deep dive into security of factors used in MFA.Phishing, spraying and stuffing… Identity attack cookbook.
We’ve heard the key words many times, but what are the identity related attacks that we’re trying to fight against? Let’s take a look at…
View More Phishing, spraying and stuffing… Identity attack cookbook.Dissection of a breach. How weak IAM trumps even the strongest security.
Once again Michael Finley, the master or identity memes, made me laugh with his picture (see above) but also, yet again, made me think. Are…
View More Dissection of a breach. How weak IAM trumps even the strongest security.Dynamic Authorisation
Dynamic Authorisation was one of the most misleading terms in IAM space, at least for me. The word dynamic implies a capability for the ‘on…
View More Dynamic AuthorisationA Christmas Tale of… Identity
The Ghost of Identity Past Being a geek, I remember really well my first encounter with The Internet. Perhaps it’s because I am inevitably moving…
View More A Christmas Tale of… Identity