The Problem of Non-User IDs in Organizations Today
(The contents of this article are captured here and reflected back in response to an article posted on SailPoint’s Identity Quotient Blog article entitled “Third-Party …
CyberSecurity Strategist | Advisor | Evangelist | Consultant | Hands-On Technologist | Human Router
(The contents of this article are captured here and reflected back in response to an article posted on SailPoint’s Identity Quotient Blog article entitled “Third-Party …
(Originally published on LinkedIn – January 13th, 2016) I am a firm believer that knowing the background and history of things provides a much better …
For years, the use of encryption to protect data-at-rest on computers within the enterprise was solely the responsibility of developers who coded the applications that …
President and CEO of Vormetric, Alan Kessler, blogged earlier this week concerning the far-reaching impacts of the Target breach – reflections from almost two years …
It’s been said that those who don’t learn from history are doomed to repeat it. In my last article, I wrote metaphorically about the medieval …
Traditional security has always been metaphorically tied to the medieval castle building of old: building thicker walls and drawbridges, creating multiple perimeters, raising larger armies, …
I’ve been sitting on this article and concept for months and have had others ask me about it via email — whether I’ve ever done …
G’day, mates — as they say Down Under, where I happen to be at the moment on a rather large SailPoint engagement. It’s been a …
(This post was originally posted just over a decade ago on April 7, 2013. Technology has come quite a way since then. While it is …
From an answer to a client this morning on aggregating XML in SailPoint IdentityIQ. I hope this helps others out there: Regarding your question this …