Identity Management, 9/11 & Remembrance in Action
Syndicated here from a posting on the 20th anniversary on LinkedIn September 11th, 2021. Fate, it seems, is not without a sense of irony… –The …
CyberSecurity Strategist | Advisor | Evangelist | Consultant | Hands-On Technologist | Human Router
Syndicated here from a posting on the 20th anniversary on LinkedIn September 11th, 2021. Fate, it seems, is not without a sense of irony… –The …
Syndicated here from a post on the CDW Research Hub published on March 21, 2024. Allowing third parties access to organizational systems means striking a …
The following article was written for and published here on the TrustLogix blog series pages in March 2022. I’m syndicating this here as the contents …
This article was released as a whitepaper for VeriClouds on May 2, 2020, co-authored with Stan Bounev, CEO at VeriClouds, to address common solutions that …
As a senior architect, sales engineer, and consultant out in the field working closely with senior IT security leaders and CISOs, I sometimes run into …
(The contents of this article are captured here and reflected back in response to an article posted on SailPoint’s Identity Quotient Blog article entitled “Third-Party …
Traditional security has always been metaphorically tied to the medieval castle building of old: building thicker walls and drawbridges, creating multiple perimeters, raising larger armies, …
I’ve been sitting on this article and concept for months and have had others ask me about it via email — whether I’ve ever done …
G’day, mates — as they say Down Under, where I happen to be at the moment on a rather large SailPoint engagement. It’s been a …
So you’ve been writing and using simple BeanShell rules in SailPoint IdentityIQ but you’ve come to a point in your solving of use cases where …