A selection of curated links relating to user login and authentication security controls and threat counter measures.
Do we need a "Chief Identity Officer"? What might drive the need for this and can existing business operating models satisfy the need for identity centric metrics?
Identity and Access Management has long been confined to two (or maybe three) buckets: B2E (employee focused), B2C (external consumer or customer focused) and then the “other” bucket – namely for IoT, machine to machine and application or process style IAM. I understand these buckets. My clients understand these buckets. Vendors talk to stakeholders in […]