Chad Russell – Welcome to the Blogosphere!
I always enjoy learning about a new Identity Management blog. Today, please joining me in welcoming Chad Russell, an Oracle colleague and good friend who hails from the great state of Arkansas, into...
View ArticleIAM – Fundamental Enabler for New Business Models
During the past three weeks, I have interacted with three major customers, in industries as diverse as transportation, apparel and entertainment, that had one thing clearly in common – each saw...
View Article“Audit Eye”– Are You Facing a Tough Audit?
Do you lapse into the “Audit Eye” trance when facing a tough audit? Oracle Identity Analytics can help … really!
View ArticleJoin me at the Oracle Security Solutions Forum
On September 22nd, I will give two presentations at the Oracle Security Solutions Forum held at the W Hotel in Scottsdale, Arizona: Identity Management 11g: A Giant Leap in Identity Management...
View ArticleOracle Webcast: Escape the Quagmire with the Oracle Identity Platform
In an Oracle webcast on September 20th, Scott Bonnell, Sr. Director of Product Management, Oracle, and Naresh Persaud, Director of Product Marketing, Oracle, will explore how the Oracle identity...
View ArticleVeriphyr Study: Protected Health Information (PHI) Privacy Breaches
This afternoon, I received word that Veriphyr, a provider of SaaS Identity and Access Intelligence services, announced the results of new survey on Protected Health Information (PHI) privacy breaches....
View ArticleFacebook – My Identity Arbiter?
Arbiter: a person empowered to decide matters at issue; judge; umpire a person who has the sole or absolute power of judging or determining. When I read the recent Computerworld article, “Facebook: The...
View ArticleTrend Watch: Identity Management Top 5
This week’s Oracle Information InDepth Security newsletter, “Inside Out Edition,” featured comments from Vadim Lander, Oracle’s chief identity architect on key trends that will shape identity...
View ArticleIAM Disruption vs. Innovative Migration
I enjoyed reading Martin Kuppinger’s response to Ian Glazer’s challenge, “Killing Identity Management in Order to Save it.” I tend to align with Martin’s conclusion as a pragmatic approach: I do not...
View ArticleIdentity and Access Management – Capability Model
In a recent twitter conversation with Andre Koot, he suggested that we needed innovation in both Identity Management and Access Management. He referred me to his blog, entitled “Let’s Kill the IAM...
View ArticleWebcast: Automating User Provisioning – A User’s Perspective
Tomorrow, Tuesday, April 11th, at 11am PST, Oracle is presenting a live webcast, Automating User Provisioning – A User’s Perspective, featuring Jim Moran, CISO of Educational Testing Service (ETS)...
View ArticleWe do eat our own dog food (aka Oracle Access Manager 11g)!
I was pleased to receive the following notice from Oracle product management in my email box this week: Hi All, As you might know, the transition of Corporate Single Sign-On (Intranet and Extranet) to...
View ArticleOracle White Paper: Information Security – A Conceptual Architecture Approach
I just learned today about a new Oracle whitepaper entitled, “Information Security: A Conceptual Architecture Approach,” written by Paul Toal. The paper’s basic premise is: Information Security is a...
View ArticleWhen Can I Pay for Stuff with my iPhone?
I am anxious for the time when I can buy groceries or pay for a meal with my iPhone. According to Juniper Research, that time may be be closer than you would think. As reported by GigaOM, Juniper...
View ArticleGartner names Veriphyr “Cool Vendor in Identity and Access Management”
Congratulations to my good friend Alan Norquist, whose company Veriphyr was named a “Cool Vendor in Identity and Access Management” by in a recent Gartner report. Veriphyr offers an on-demand SaaS...
View ArticleNational Strategy For Trusted Identities In Cyberspace – My Take
When I hear a message that begins, “We’re from the government, and we’re here to help,” I am naturally suspicious. My political philosophy, based on personal freedom, individual responsibility and...
View ArticleSource Doc: PCI DSS Virtualization Guidelines
On June 14th, the PCI Security Standards Council announced publication of the PCI DSS Virtualization Guidelines Information Supplement, which “provides guidance to those in the payment chain on the use...
View ArticleAberdeen Research Brief: Identity and Access Management – Platform vs. Point...
One of the big questions in modern Identity and Access Management continues to be: “Is it better to choose individual point solutions and integrate them in my enterprise, or should I choose a complete...
View Article