Quantcast
Channel: Identity Management – Discovering Identity
Browsing latest articles
Browse All 18 View Live

Image may be NSFW.
Clik here to view.

Chad Russell – Welcome to the Blogosphere!

I always enjoy learning about a new Identity Management blog. Today, please joining me in welcoming Chad Russell, an Oracle colleague and good friend who hails from the great state of Arkansas, into...

View Article



Image may be NSFW.
Clik here to view.

IAM – Fundamental Enabler for New Business Models

During the past three weeks, I have interacted with three major customers, in industries as diverse as transportation, apparel and entertainment, that had one thing clearly in common – each saw...

View Article

“Audit Eye”– Are You Facing a Tough Audit?

Do you lapse into the “Audit Eye” trance when facing a tough audit?   Oracle Identity Analytics can help … really!

View Article

Image may be NSFW.
Clik here to view.

Join me at the Oracle Security Solutions Forum

On September 22nd, I will give two presentations at the Oracle Security Solutions Forum held at the W Hotel in Scottsdale, Arizona: Identity Management 11g: A Giant Leap in Identity Management...

View Article

Image may be NSFW.
Clik here to view.

Oracle Webcast: Escape the Quagmire with the Oracle Identity Platform

In an Oracle webcast on September 20th, Scott Bonnell, Sr. Director of Product Management, Oracle, and Naresh Persaud, Director of Product Marketing, Oracle, will explore how the Oracle identity...

View Article


Image may be NSFW.
Clik here to view.

Veriphyr Study: Protected Health Information (PHI) Privacy Breaches

This afternoon, I received word that Veriphyr, a provider of SaaS Identity and Access Intelligence services, announced the results of new survey on Protected Health Information (PHI) privacy breaches....

View Article

Image may be NSFW.
Clik here to view.

Facebook – My Identity Arbiter?

Arbiter: a person empowered to decide matters at issue; judge; umpire a person who has the sole or absolute power of judging or determining. When I read the recent Computerworld article, “Facebook: The...

View Article

Image may be NSFW.
Clik here to view.

Trend Watch: Identity Management Top 5

This week’s Oracle Information InDepth Security newsletter, “Inside Out Edition,” featured comments from Vadim Lander, Oracle’s chief identity architect on key trends that will shape identity...

View Article


Image may be NSFW.
Clik here to view.

IAM Disruption vs. Innovative Migration

I enjoyed reading Martin Kuppinger’s response to Ian Glazer’s challenge, “Killing Identity Management in Order to Save it.” I tend to align with Martin’s conclusion as a pragmatic approach: I do not...

View Article


Image may be NSFW.
Clik here to view.

Identity and Access Management – Capability Model

In a recent twitter conversation with Andre Koot, he suggested that we needed innovation in both Identity Management and Access Management.  He referred me to his blog, entitled “Let’s Kill the IAM...

View Article

Image may be NSFW.
Clik here to view.

Webcast: Automating User Provisioning – A User’s Perspective

Tomorrow, Tuesday, April 11th, at 11am PST, Oracle is presenting a live webcast, Automating User Provisioning – A User’s Perspective, featuring Jim Moran,  CISO of Educational Testing Service (ETS)...

View Article

Image may be NSFW.
Clik here to view.

We do eat our own dog food (aka Oracle Access Manager 11g)!

I was pleased to receive the following notice from Oracle product management in my email box this week: Hi All, As you might know, the transition of Corporate Single Sign-On (Intranet and Extranet) to...

View Article

Image may be NSFW.
Clik here to view.

Oracle White Paper: Information Security – A Conceptual Architecture Approach

  I just learned today about a new Oracle whitepaper entitled, “Information Security: A Conceptual Architecture Approach,” written by Paul Toal.  The paper’s basic premise is: Information Security is a...

View Article


Image may be NSFW.
Clik here to view.

When Can I Pay for Stuff with my iPhone?

  I am anxious for the time when I can buy groceries or pay for a meal with my iPhone.  According to Juniper Research, that time may be be closer than you would think. As reported by GigaOM, Juniper...

View Article

Image may be NSFW.
Clik here to view.

Gartner names Veriphyr “Cool Vendor in Identity and Access Management”

Congratulations to my good friend Alan Norquist, whose company Veriphyr was named a “Cool Vendor in Identity and Access Management” by in a recent Gartner report.  Veriphyr offers an on-demand SaaS...

View Article


Image may be NSFW.
Clik here to view.

National Strategy For Trusted Identities In Cyberspace – My Take

  When I hear a message that begins, “We’re from the government, and we’re here to help,” I am naturally suspicious.  My political philosophy, based on personal freedom, individual responsibility and...

View Article

Image may be NSFW.
Clik here to view.

Source Doc: PCI DSS Virtualization Guidelines

On June 14th, the PCI Security Standards Council announced publication of the PCI DSS Virtualization Guidelines Information Supplement, which “provides guidance to those in the payment chain on the use...

View Article


Image may be NSFW.
Clik here to view.

Aberdeen Research Brief: Identity and Access Management – Platform vs. Point...

One of the big questions in modern Identity and Access Management continues to be: “Is it better to choose individual point solutions and integrate them in my enterprise, or should I choose a complete...

View Article
Browsing latest articles
Browse All 18 View Live


Latest Images